the use of pro-active versus re-active risk management practices for managing supply chains

115
UNIVERSITEIT GENT FACULTEIT ECONOMIE EN BEDRIJFSKUNDE ACADEMIEJAAR 2013 2014 The use of pro-active versus re-active risk management practices for managing supply chains Masterproef voorgedragen tot het bekomen van de graad van Master of Science in de Toegepaste Economische Wetenschappen: Handelsingenieur Pieterjan Tilleman onder leiding van Prof. Ann Vereecke Begeleider: Evelyne Vanpoucke

Upload: pieterjan-tilleman

Post on 20-Mar-2017

99 views

Category:

Documents


1 download

TRANSCRIPT

UNIVERSITEIT GENT

FACULTEIT ECONOMIE EN BEDRIJFSKUNDE

ACADEMIEJAAR 2013 – 2014

The use of pro-active versus re-active risk management practices for managing

supply chains

Masterproef voorgedragen tot het bekomen van de graad van

Master of Science in de

Toegepaste Economische Wetenschappen: Handelsingenieur

Pieterjan Tilleman

onder leiding van

Prof. Ann Vereecke

Begeleider: Evelyne Vanpoucke

I

UNIVERSITEIT GENT

FACULTEIT ECONOMIE EN BEDRIJFSKUNDE

ACADEMIEJAAR 2013 – 2014

The use of pro-active versus re-active risk management practices for managing

supply chains

Masterproef voorgedragen tot het bekomen van de graad van

Master of Science in de

Toegepaste Economische Wetenschappen: Handelsingenieur

Pieterjan Tilleman

onder leiding van

Prof. Ann Vereecke

Begeleider: Evelyne Vanpoucke

II

CLAUSE OF CONFIDENTIALITY

PERMISSION Ondergetekende verklaart dat de inhoud van deze masterproef mag geraadpleegd en/of gereproduceerd worden, mits bronvermelding. Pieterjan Tilleman

III

Acknowledgements

Vooreerst wil ik Evelyne Vanpoucke van harte bedanken voor de volle steun, de vele raad, de nodige

tijd en de snelle beantwoording van vele emails die mij op het goede pad hebben geleid.

Vervolgens mag ik een dank aan mijn vriendin Louise uiten voor de hulp met de bibliografie en de

steun en toeverlaat wanneer het eens wat minder vlotte.

Ook mag ik de medewerking van de vele operations en supply chain managers van de deelgenomen

Belgische bedrijven aan dit onderzoek niet vergeten. Al was het soms een niet voor de hand liggende

opdracht om een vragenlijst van een dergelijke omvang ingevuld te krijgen, doch zonder deze data

zou dit werk niet tot stand gekomen zijn.

Tenslotte, dank ik mijn familie voor de volharding en de enorme steun en in het bijzonder mijn vader

voor het nalezen van dit werk.

IV

Table of Contents Table of Contents ................................................................................................................................. IV

List of Tables....................................................................................................................................... VIII

List of Formulas .................................................................................................................................. VIII

List of Figures ......................................................................................................................................... 1

1 Introduction ................................................................................................................................... 1

2 Literature research ......................................................................................................................... 3

2.1 Risk Management ................................................................................................................... 3

2.1.1 The Nature of Supply Chain Risk ..................................................................................... 3

2.1.2 Risk management ......................................................................................................... 11

2.2 Supply Chain Management ................................................................................................... 22

2.3 Supply Chain Risk Management ........................................................................................... 27

2.4 Supply Chain Security Management ..................................................................................... 30

2.5 Conclusion ............................................................................................................................ 32

3 Conceptual framework ................................................................................................................. 33

3.1 Environment ......................................................................................................................... 33

3.2 Risk perception or representation of risk ............................................................................. 35

3.3 Proactive versus Reactive Risk Strategies ............................................................................. 36

3.4 Moderators and Mediators .................................................................................................. 39

3.4.1 Supply chain management practices. ........................................................................... 39

3.4.2 Design and complexity of the supply chain................................................................... 41

3.4.3 Continental differences ................................................................................................ 46

3.4.4 Comparison with 3 years ago........................................................................................ 46

3.5 Model diagram ..................................................................................................................... 47

4 Data Collection ............................................................................................................................. 48

4.1 Introduction .......................................................................................................................... 48

4.2 Results .................................................................................................................................. 49

4.3 Variables and constructs ...................................................................................................... 50

4.4 Exploratory factor analysis (EFA) .......................................................................................... 52

5 Methodology and Analysis ........................................................................................................... 53

5.1 General model ...................................................................................................................... 53

5.1.1 Confirmatory Factor Analysis (CFA) of the general model ............................................ 53

5.1.2 Comparison with alternative frameworks .................................................................... 56

5.1.3 Descriptive statistics ..................................................................................................... 57

V

5.1.4 Hypothesis testing ........................................................................................................ 58

5.1.5 Multicollinearity ........................................................................................................... 59

5.2 Input from mediator variables .............................................................................................. 60

5.2.1 Framework ................................................................................................................... 60

5.2.2 Confirmatory factor analysis ......................................................................................... 61

5.2.3 Descriptive statistics with mediator variables .............................................................. 61

5.2.4 Structural path significance .......................................................................................... 62

5.2.5 Mediating effect and hypothesis testing ...................................................................... 62

5.3 Input from moderator variables ........................................................................................... 64

5.3.1 Descriptive statistics and differences for the moderator variables .............................. 64

5.3.2 Moderating effect and moderated mediation .............................................................. 67

5.4 Some comparison with 3 years ago ...................................................................................... 71

5.5 Hypothesis summary ............................................................................................................ 72

6 Overall Conclusion ........................................................................................................................ 73

7 Limitations and possibilities for future research .......................................................................... 75

8 References .................................................................................................................................... 76

9 Appendices ................................................................................................................................... 80

Appendix 1: PWC results .................................................................................................................. 80

Appendix 2: Participated Belgian companies ................................................................................... 81

Appendix 3: Internal consistency scale measurement ..................................................................... 82

Appendix 4: Descriptive statistics ..................................................................................................... 85

Appendix 5: Different frameworks ................................................................................................... 88

Appendix 6: Confirmatory Factor analysis for alternative framework formulations ........................ 89

Appendix 6: T-statistics for mediators .............................................................................................. 93

Appendix 7: Sobel test ...................................................................................................................... 94

Appendix 8: Paired Sampled T-statistics ........................................................................................... 96

Appendix 9: Multi-group moderation and moderated mediation .................................................. 100

Appendix 10: Statistics for differences with 3 years ago ................................................................ 102

Variable paired samples t-test .................................................................................................... 102

Paired sample t-tests for relationships ....................................................................................... 105

VI

Abbreviations list

DV: Dependent Variable

ERM: Enterprise Risk Management

FMEA: Failure Mode and Effect Analysis

IV: Independent Variable

PEST- variable: variable that signifies Political, Economical, Social & Technological trends in the

environment

PORTER-variable: variable that takes a look at the company’s competitive forces

RM: Risk Management

SC: Supply Chain

SCD&C: Supply Chain Design and Complexity

SCM: Supply Chain Management

SCRM: Supply Chain Risk Management

SCSM: Supply Chain Security Management

SCVM: Supply Chain Vulnerability Map

SME: Small and Medium Enterprise

TQM: Total Quality Management

VII

List of Figures Figure 1: risk aspects ............................................................................................................................. 5

Figure 2: Dimensions of risk ................................................................................................................... 6

Figure 3: risk sources .............................................................................................................................. 7

Figure 4: vulnerability - efficiency relation (left), vulnerability - simplicity (right) .................................. 9

Figure 5: risk management framework ................................................................................................ 11

Figure 6: fault tree analysis for the AVIA example ............................................................................... 13

Figure 7: risk matrix for the additional probability of detecting risks ................................................... 14

Figure 8: risk mitigations strategies ...................................................................................................... 19

Figure 9: the concept of Supply Chain Risk Management (Blos et al., 2009) ........................................ 27

Figure 10: a SCRM framework .............................................................................................................. 29

Figure 11: PEST anlysis ......................................................................................................................... 34

Figure 12: Porter's Five Forces Model .................................................................................................. 35

Figure 13: Supply Chain ........................................................................................................................ 41

Figure 14: Supply Network ................................................................................................................... 42

Figure 15: a more complex and adaptive network ............................................................................... 42

Figure 16: supply information network ................................................................................................ 44

Figure 17: Model diagram .................................................................................................................... 47

Figure 18: proportion of participated industries .................................................................................. 49

Figure 19: proportion of participated countries ................................................................................... 49

Figure 20: General Model ..................................................................................................................... 53

Figure 21: framework with general SCM mediator between environment and risk perception (first

framework) .......................................................................................................................................... 60

Figure 22: Framework with general SCM mediator between risk perception and risk management

(second framework) ............................................................................................................................. 61

Figure 23: Mediating effect .................................................................................................................. 63

Figure 24: Environmental factors between Europe and Asia ............................................................... 64

Figure 25: Risk Probability and Impact for Europe and Asia ................................................................. 65

Figure 26: calculation for the multi-group moderation t-statistic and p-value..................................... 68

VIII

List of Tables Table 1: risk criticality matrix ............................................................................................................... 14

Table 2: risk management actions ........................................................................................................ 17

Table 3: the business from a biological view ........................................................................................ 43

Table 4: Environmental constructs ....................................................................................................... 50

Table 5: Risk perception variables ........................................................................................................ 50

Table 6: Proactive and Reactive Management ..................................................................................... 50

Table 7: Supply Chain Management Practices ...................................................................................... 51

Table 8: Supply Chain design and complexity ....................................................................................... 52

Table 9: CFA summary table ................................................................................................................. 54

Table 10: Discriminant validiy .............................................................................................................. 55

Table 11: CFA summary table for comparison with other frameworks ................................................ 57

Table 12: outer model T-statistics ........................................................................................................ 58

Table 13: inner model loadings and T-statistics ................................................................................... 58

Table 14: Multicollinearity ................................................................................................................... 59

Table 15: Risk management for Europe and Asia ................................................................................. 65

Table 16: Risk management for lower and higher complex networks.................................................. 66

Table 17: determination coefficients ................................................................................................... 67

Table 18: Mean, standard errors and T-statistics for the two groups for moderation ......................... 70

Table 19: hypothesis summary table .................................................................................................... 72

List of Formulas Formula 1: Sobel test statistic .............................................................................................................. 62

Formula 2: t-test for multi-group moderation and moderated mediation ........................................... 68

1

1 Introduction

In many business environments, networking in supply chains is almost an inevitable solution to help

companies respond fast to market changes. A lot of opportunities are accompanied with networking.

Examples are lower transaction costs, ability to concentrate on core skills, lower capital investments,

sharing sunk costs, greater flexibility and access to key technologies. So the use, the meaning and the

practices of the concept supply chain management became important.

However, increased network cooperation does increase the dependency between organizations and

as a consequence of the advantages above companies become more exposed to the risks of other

companies. Hence networking causes transfer of risks between several companies from a supplier-

customer viewpoint. It may decrease some risks but unfortunately increase others. Inevitably

partners must share their risk among them as a solution to mitigate their risks and to succeed in their

operations. Therefore today’s industries must operate under extreme caution and the concept of

supply chain risk management was born.

The need of the concept became useful after series of crises and catastrophes had attracted public

attention like natural disasters, political and economic instabilities, terrorist attacks and many more.

Secondly modern supply chains seem to be more vulnerable than ever: increased competitive

pressure in the business environment and globalization of markets. Counterfeiting products has

increasingly entered the supply chain and harms a company’s product and reputation. The financial

crisis has brought companies to be very suspicious and seek to ensure their business and operations

continuity. Nowadays they struggle more than ever from facts like supplier insolvency and less access

to credit that especially impact the less financially stable companies.

There are plenty number of relevant examples. Automobile manufacturer Land Rover found itself in

serious trouble after its only supplier of chassis frames, UPF-Thomson, suddenly and unexpectedly

folded further supply delivery (Sheffi & Rice Jr, 2005; Wagner & Bode, 2009). Electronic company

Ericsson faced dramatic problems with a huge impact, after a fire at a sub-supplier and has

implemented an entire new organization with new supplier risk management tools (Norrman &

Jansson, 2004). Ford, Toyota and DaimlerChrysler experienced massive disruptions to the flow of

materials into their North-American assembly plants within a few days after the terrorist attack of

9/11 due to border shut-downs (Sheffi & Rice Jr, 2005).

Globalization compelled firms to make their supply chains more efficient, resilient or more

responsive by outsourcing or off shoring activities, sourcing in low-cost countries, collaborations with

2

other partnerships, decreasing inventory and so on. But all these activities can be associated with a

higher level of risk and supply chain sensitivity.

A report stated that companies suffering from supply chain disruptions experienced 33-40% lower

stock returns relative to their industry benchmarks. Consequently it can also negatively impact a

firm’s brand image and reputation. In addition severe disruptions like the Fukushima nuclear disaster

have healthy and safety risk consequences.

So concluded we feel the need for risk management in a relatively unstable world on the one hand

and an increasingly flexible supply chain on the other hand.

This work gives an introduction into the risk management world. We will discuss the main concepts

of risk, the perceptions, the difference between proactive and reactive mitigation strategies, the

supply chain practices that are needed to stay resilient and many more on the basis of existing

literature. Secondly we will employ our gained knowledge to build and test a framework that make

use of several aspects of the environment, risk concepts and supply chain practices and complexity.

Data was collected in many industries to achieve this goal. Additionally we will try to do some

investigation for progressions in the past three years and compare continents, in particular European

and Asian countries. In the end we will come up with some meaningful conclusions that fit with our

model and outcomes, give some limitations and suggestions for future research.

3

2 Literature research

First we will dig in to the world of risk management with all his facets. Thereafter we will consider

supply chain management concept and finally we will end up with the meaning of supply chain risk

management and some thoughts of supply chain security management.

2.1 Risk Management

2.1.1 The Nature of Supply Chain Risk

Introductory case

Consider a random company; named AVIA. AVIA is a manufacturing company that produces metallic

aircraft components for the aviation industry. It is operating its activities since a long time. Through

these years it has maintained its supplier base, the metal industry and reached its few customers

from the aircraft assembly industry. Suppose now that because of tensions in the commodity market,

the company that is responsible for the supply on metal parts has defaulted to deliver the needed

products. Company AVIA can appeal on a few minor companies but this amount is not sufficient. You

as a company decide to produce further your semi-finished goods with the little supply of metal parts.

Suppose then a major customer refuse to do further business with you because you have augmented

your prices due to your increased variable costs per part produced. Or you are unable anymore to

deliver the requested components on time because time goes by until you receive your parts. On top

of that a fire caught your plant and a third of your machinery capacity has been demolished.

Reinvesting in new assembly equipment is accompanied with a lot of costs. As a consequence you

see your benefits declining and you end the year with a very negative profit and loss account for the

AVIA Company.

Risk

Functions which generate the possibility of beneficial effects or profit often include risks. This is

certainly the case with business activities. So risk can here be for example:

1) Your supplier fails in delivering the needed metal parts such that you operate under capacity.

2) Problems in fulfilling customer deliveries arise because you cannot deliver your aircraft

components on time.

3) Because of cost considerations you increase your prices. Customers quit business with AVIA

which results in a too low or inappropriate demand.

4) Due to a fire at the production plant, it is difficult to get back on track which resides in the

difficult re-management of its costs, resources, development and flexibility.

4

The above situations are all examples that contain risk. We can already make a first distinction

between demand side risks and supply side risks. The third risk is an example of the first category and

the first risk is an example of the latter. These are risk categories that are internal to the supply chain

whereas the fourth risk is an example of an external to the supply chain risk. But what is risk actually?

Risk is a characteristic of decisions that is defined as the extent to which there is uncertainty about

whether potentially significant and/or disappointing outcomes of decisions will be realized (Sitkin &

Pablo, 1992). So risks suggest variation in the distribution of possible outcomes, their likelihoods and

their subjective values (Wagner & Bode, 2008). According to Kahneman & Tversky’s “prospect theory”

individual risk behavior is determined how the situation is framed. For example if individuals are

protecting prior gains will be more risk averse.

In financial risk management, risk is considered as having an upside and downside potential of

possible outcomes according to a normal distribution with a two-sided variance. In contrast the aim

of this work is to approach risks in supply chains which can be better stated, considering the severe

impact of disruptions, as being purely negative. According to several authors, risk is considered in this

manner and that corresponds best from a supply chain consideration (Wagner & Bode, 2009).

Zsidisin (2003) contains a broad definition of risk applied to the supply chain: the probability of an

incident associated with inbound supply from individual supplier failures (quality, delivery,

relationships and price) or the supply market occurring, in which its outcomes result in the inability

of the purchasing firm to meet customer demand or cause threats to customer life and safety. What

is good in this definition is that it mentions the distinction between supply and demand side risks. It

mentions some supply risks but these are not exhaustive. Production capacity constraints on the

supply market, technological changes with the supplier, product design features, to mention a few

can also play a role. It also assesses the risk aspects which are important to understand risk.

Risk aspects

In the former definition we find 2 important aspects that constitute risk namely the extent or the

impact of outcomes and the possibility or potentially significance that may or may not be

disappointing of these outcomes. These are convenient aspects of risk because according to the

Bayesian theory when you multiply these two figures for each outcome you get the distribution and

thus the severity of each possible outcome. Therefore we can split risk in 4 categories shown in figure

1 below. We consider the enterprise’s vulnerability the highest when both the likelihood and the

impact of disruption are high whereas rare, low impact events require less action to mitigate.

Furthermore disruptions that combine high probability and low impact are part of the daily

operations in the normal flow of business. On the other hand risks with low likelihoods but high

5

consequences need a concrete planning and interference that is outside the daily business

operations. The fire at our plant is an example of a low probability, high impact risk. A reduced

demand of your aircraft assemblies could be an example of high probability low impact risk. It is

important that you recognize this risk in function of your company because the probability and

impact differs among different corporations. A strike in one plant of the Airbus corporations has a

lower impact on a big multinational with several aviation plants than the same strike in our little AVIA

plant.

Figure 1: risk aspects

Kleindorfer and Saad (2005) suggest besides impact and probability, the speed of the possible risk

can also play a role. Speed can be understood as the rate at which the event leading to loss happens,

the rate at which these losses happen and how quickly the risk event is discovered by the company.

Furthermore the frequency or how often a similar kind of risk event happens. In our situation how

often will our major supplier fail to deliver our metal parts? If this occurs too frequently our company

may lose his reputation, several customers will abandon AVIA and in the long run our company may

be even going out of business.

At last, Griffis and Whipple (2012)consider the probability of risk detection as an additional aspect of

risk and adds a third dimension besides impact and probability. For instance, a high-likelihood/high-

impact risk that is also extremely difficult to detect, warrants a substantially different risk

management strategy than a high-likelihood/high-impact risk that can be more readily detected (see

further).

Low impact

High probability

High impact

High probability

Low impact

Low probability

High impact

Low probability

6

Figure 2: Dimensions of risk

Risk Drivers and Risk Natures

At some point you as a manager believe something exists in your business operations environment

and will lead to a particular risk event and a serious impact could occur (P. G. Smith & Merritt, 2002).

This is what we call risk drivers. Risk drivers can further increase the risk experienced by the supply

chain participants (Jüttner, Peck, & Christopher, 2003). The tensions on the commodity market in

metal parts supply or serious changes in a foreign currency exchanges rate are examples of risk

drivers. They can lead to a serious risk event and it’s important to watch out and keep in mind that

such events, although at first sight these seems to be far from your business, can cause problems to

your firm. Competition and globalization increase risk indirectly whereas outsourcing which can

results in increasing complexity can have a direct effect on risks (Jüttner et al., 2003). In essence, risk

drivers are the start of causal pathways that ends up in risks.

A further distinction can be made according to Kleindorfer and Saad (2005) on the nature of the risks

or risk sources. These are variables (networking, environmental and operational) which cannot be

predicted with certainty and which impact on the supply chain outcome variables (Jüttner et al.,

2003). We can make a distinction on risks that come from coordinating supply and demand e.g.

supplier fails in delivering the needed part, on the one hand. On the other hand risk arises from

normal activities. These can be further subdivided in operational risk and risk arising from natural

hazard, terrorism or political instability or called disruptive risks. These latter are risks with low

probability, high-consequence of outcomes whereas the former has a higher probability of outcomes.

However, most of the quantitative models are designed for managing operational risk. So there is a

need towards more disruption risk models. Examples of the former are equipment malfunctions or

human centered issues from strikes to fraud. An example of the latter is the fire at AVIA Company. A

summary of risk sources can be found in the figure taken from Jüttner et al. (2003). Environmental

7

and organizational risk sources have an impact towards the supply chain whereas network risk

sources are the risk sources of the supply chain (Jüttner et al., 2003).

Figure 3: risk sources

Manuj and Mentzer (2008) on the other hand divides the sources of risk in 4 categories (Supply,

Demand, Operational and Security Risk) each with their risk event examples. Supply risks can contain

besides the above examples supplier opportunism and inbound product quality. Or the supplier can

default in flexibility to deliver the metal parts for AVIA just-in-time. Demand risk can be that our

aircraft partner’s demand is very variable or a competitor from the assembled aircraft parts industry

negotiates a more interesting demand with our metal parts suppliers. Through this AVIA is losing

market share. Another example, but occurs more in food products supply chains, is that these

products result in a weather-related demand uncertainty. For example, the demand of ice-cream is

the highest when it’s a warm weather. The authors, Chen and Yano (2010), suggest a very flexible

contracting scheme to optimize the distribution of risks between the manufacturer and retailer. This

can be achieved for example through weather related rebate contracts to mitigate demand

uncertainty. Next risks can be seen from an operational point of view like the risk on product quality

failures. At last security risks or currency risks can also play a role. Melnyk, Rodrigues, and Ragatz

(2009) added also information/technology risks (C. S. Tang, 2006), financial risks and legal/regulatory

risks (Wagner & Bode, 2008).

8

Disruptions

“Supply chain disruption is the unintended, anomalous event that materializes somewhere in the

supply chain and threatens the normal course of business operations (Wagner & Bode, 2009)”.

In other words disruption is anything that unexpectedly affects your supply chain. According to Sheffi

(2005) these events follow a disruption profile in a predictable way in terms of its effect on company

performance.

From this perspective general problems can be roughly divided between deviation, disruption and

disaster (Gaonkar & Viswanadham, 2004). Whereas the former can be more seen from an

operational view, in essence a variation in lead times or demand within the supply chain from their

expected or mean value, the latter two problems deal more on the environmental problems. With a

disruption is the structure of a supply chain radically changed and with a disaster is the supply chain

shut down temporary or irrecoverable. The authors formulated 2 mathematical optimization models

that deal with only deviation and disruption problems because modeling disasters is simply

impossible.

Random events, land natural disasters like tropical storms and earthquakes can be best estimated

from historical data for their possible occurrence. The likelihood of accidents on the other hand can

also be estimated from industry data, prior events and the enterprise particular safety programs and

implementations. Lastly, the probability of intentional disruptions such as job actions, strikes or

sabotage) is the most difficult to estimate because the likelihood is a function of the specific

company’s decisions and actions.

Then, there is the difference between several kinds of storms according to Altay and Ramirez (2010).

The impact of damage from windstorms and floods seem to be dramatically lower from that of an

earthquake in terms of operational Cash Flow. The authors give the reason for the better

predictability of these former 2 climate events and firm’s ability to prepare their firms in advance for

them. Earthquakes damages a lot and makes recovery very slow and do not allow preparation time.

In addition they show that the impact of natural disruptions is dependent on the firm’s position in

the supply chain. The disasters that can be prepared can be planned for the upstream partners.

There stock is accrued in advance and can be sold to downstream partners where these have

opposite total asset turnovers. A solution to overcome this problem with the downstream partners is

supply-chain wide risk practices because a firm that is not prepared will disrupt the operations of the

rest of the supply chain.

9

Melnyk et al. (2009) proposes a discrete event computer simulation model that is based on the

decomposition of a supply chain disruption in several facets like for example the quantity loss, time

period, periodicity, profile breath & location of a disruption and the output level of its recovery

towards the supply chain performance. They concluded that the use of classical statistical analysis is

rather limited since they do not deal with the time dimension of disruptions. Because of the transient

behavior of the process intervention analysis using time series is more appropriate in their study

(Melnyk et al., 2009). A general rule should be to include a combination of methodologies in order to

make a comparison.

Perry (2007) builds a disaster response model after the 2004 Tsunami in Thailand that is for a part

transferable to a business context. They highlight the logistic aspects (expertise and efficiency) and

the need for quick information by extensive communication and local knowledge to deal with

disasters quickly. This can be the case when some manufacturing activities are outsourced in a

distant country.

Vulnerability

It seems according to Wagner and Bode (2009) that probability of risks are determined by supply

chain characteristics (density, complexity, criticality, …) and consequently their vulnerability both as

part of as well as across the entire supply chain. Vulnerability is defined according to (Blaikie,

1994;(Wagner & Bode, 2009) ) as a company’s capacity to anticipate, cope with, resist, and recover

from the impact of a natural hazard. Several characteristics of the supply chain increase or decrease

the vulnerability of the supply chain.

For example extreme leanness and efficiency is very effective for a company’s operations and

reliability towards their customers but may result in an increasing level of vulnerability. While lean

management can provide several advantages in cost reductions and efficiency, it makes companies

more hazardous to risk vulnerability and velocity. Consequently establishing back-up systems and

maintaining reasonable slack can increase the level of readiness in managing risk. One can make a

vuln

erab

ility

efficiency operations

vuln

erab

ility

simplicity supply network

Figure 4: vulnerability - efficiency relation (left), vulnerability - simplicity (right)

10

trade-off between robustness and overall efficiency to cope the level of risk. And because of the

supply chain is only as secure as its weakest link minor movements can entail serious disruptions

which makes the supply chain very vulnerable. Second, to reach more leanness or customer made

products provided to worldwide demand, often this is coupled with an increasing complex network.

But this must be paid off towards increasing vulnerability. We shall further see that one can

overcome the vulnerability in complex network by being more resilient.

Sheffi proposed a supply chain vulnerability map (SCVM) with four quadrants namely financial,

strategic, hazard and operational vulnerability. Strategic vulnerability means the vulnerability when a

new product is introduced. Hazard vulnerabilities are the internal as well as external risk drivers

previously described. Operations vulnerability focus on the supply chain as for example distribution

network failures. The framework is constructed in a manner that items of a category placed in the

centre are very important and those on the edge less important. The goal of this framework is that

each of the categories has a property to find, quantify and minimize risk (Blos, Quaddus, Wee, &

Watanabe, 2009).

Wagner and Bode (2006) found evidence of the effect of supply chain vulnerability drivers are

positive towards more supply chain risk. This is the case for supplier dependence, single and multiple

sourcing. So firms must according to Wagner and Bode (2006) avoid dependences and improve the

robustness of a company’s chain. Meanwhile the choice of single or global sourcing must be done

through a risk-benefit analysis (see further).

Vulnerability is not in every industry the same. The aircraft manufacturing industry operates in an

extreme risk environment, characterized by high levels of commercial, technological and political risk

as well as the inherent product safety issues (Haywood & Peck, 2003). Interviewed companies from

the author’s research acknowledged that their supply chain is most vulnerable during times of

change as the risk profiles affecting their supply chains were also changing, but also that change is a

constant state in their supply chain activities. Aircraft companies never experienced a steady-state

resulting in increased supply chain change management (Haywood & Peck, 2003).

To reduce a company’s weakness Asbjørnslett (2009) suggest to take a vulnerability analysis. It’s a

top down analysis and its main focus is towards the system mission and the survivability of the

system (Asbjørnslett, 2009). The essential steps to take this analysis is first to search for possible

threats and their consequences, next the company must bring back their system to new stability by

aligning adequate resource and last determine the disruption or the time the stability is again

established. It gives a complete proactive vulnerability analysis framework that works in two rounds.

11

First the manager tries to understand the threats and risks, analyses and rank the consequent

possible scenarios and is left over with a set of critical vulnerable elements in a first round. These

require additional specific analysis that needs reduced fragility by adding appropriate resource to

mitigate their criticality to them in a second round of investigation.

2.1.2 Risk management

Risk management is defined as identifying and assessing the probabilities and consequences of risks,

and selecting appropriate risk strategies to reduce the probability of, or losses associated with,

adverse events (Manuj & Mentzer, 2008).

The execution of an overall risk management process is useful for companies because managers tend

to focus solely on critical performance targets, which affect the way they manage risk (C. S. Tang,

2006). The need for more supply chain and risk management has certainly become clear after the

PWC investigation (Levi, Vassiladis, & Kyratzoglou, 2013). In their research they categorize

enterprises in 4 levels of achievement of supply chain and risk management. They grouped the two

lower and two higher levels together to reach some conclusions. Appendix ? gives some results from

their study and show the percentage of companies with more than 3 incidents that suffered an

impact of 3% or higher on their performance as a result of supply chain disruptions. First companies

that invested in an advanced risk and supply chain management level are better equipped towards

risks than lower risk management levels.

Framework for a general structure of the risk management process

Figure 5: risk management framework

Supply risk management contains several steps and can be seen on the figure 5 (Hallikas, Karvonen,

Pulkkinen, Virolainen, & Tuominen, 2004), (Griffis & Whipple, 2012; Zsidisin, 2003),). The different

steps will be discussed successively.

Risk Identification Risk Assesment, Evaluation and prioritization

Risk Management actions and

Mitigation strategies

Risk Monitoring and Strategy Sharing

12

Risk Identification

Equipment interruptions, quality failures and supply fluctuations. These are common strong signals

of risks in manufacturing systems. The main focus of risk identification is to recognize future

uncertainties to be able to manage these scenarios proactively in a later stage. Chopra and Sodhi

2004 identified nine broad categories of supply chain risks: disruptions, delays, systems, forecasts,

intellectual property, procurement, receivables, inventory and capacity. Furthermore according to

Manuj and Mentzer (2008) it is recommend that, once identified, risks should be segmented by

specific characteristics in order to create a risk profile. You can categorize them in domestic or global

risks.

Once you start to investigate and identify risk, a common approach is to start with a brainstorming

session with the management team with a diversity of people from sales, marketing, quality and

finance if possible of your business. It can be helpful sometimes to get your session accompanied

with your supply chain partners or major customers ((P. G. Smith & Merritt, 2002), (Preston G Smith,

2002)). By brainstorming you can base your business on the past as well as you can ask if everyone

can think of success factors and wonder themselves what can go wrong? Actions that can be

performed to discover risks are for example (Mullai, 2009):

- Identify risk generating activities

- Identify and formulate problems

- Determine the background to determine the context

- Define (technical, analytical) boundaries for the study

- Collect relevant risk-related data and information

Daimler Chrysler had to quit production for several days because of a defective fuel injector that

came from their supplier Bosch, so the former company claimed his supplier for delivering the wrong

part. Bosch claimed that it didn’t make mistakes but instead pointed at his supplier Federal Mogul for

their faulty sockets which in turn found his supplier Dupont guilty for delivering defective granulates

(Henke, 2009). A practical approach in finding the origin of disruptions is the use of the Tree model.

This allows you to find the underlying root causes for today’s disruptions but also by using “what if”

scenarios to get the root cause for future uncertainties (Griffis & Whipple, 2012). Ask yourself “what

could go wrong at this point that would prevent us from achieving success”, especially for projects.

Ultimately in a later stage this can form the basis for a comprehensive scenario planning approach

(Sheffi & Rice Jr, 2005). Also a risk simulation can be done or a sensitivity analysis can be performed

to check if some crucial parameters or outputs change in different scenarios. It is important to find

13

the causes because they require different modes of prevention and have also different potential

impacts. An example of a fault tree analyses with root causes for our case of AVIA is given below:

Figure 6: fault tree analysis for the AVIA example

Secondly, we can address the reliability tools from Total Quality Management (TQM) to discover risks.

One tool that can be used for Risk Identification is Failure Mode Effects and Criticality Analysis

(FMECA). In essence this tool aims at performing bottom-up analyses of processes to determine

where systems might fail, and then to either design out or improve detection of these potential

failure points. The advantage is that this procedure moves from reactive to a more proactive means

of equipment maintenance in an effort to reduce equipment breakdown and failure. But this tool is

relatively absent from the supply chain literature because it often lacks the assessment/evaluation

factors such as probability and likelihood. A better approach would then be Failure Modes and

Effects Analysis (FMEA) in a supply chain context. With this method you have to identify and rank

potential failure modes of a design or manufacturing process but its disadvantage is that it does not

take criticality into account and thus does not completely address the potential impact of a risk

(Griffis & Whipple, 2012).

Especially for the identification of possible catastrophic events, Knemeyer, Zinn, and Eroglu (2009)

applied this risk management framework for low probability high impact events. Companies have to

determine the key supply locations with highest probability of threats and a list of them. Approaches

that can help them are “internal assassin” whereby a manager who thinks as a terrorist and thinks

Lost sales opportunity with aircraft industry

metal part stock out

lead time delay

tensions in the commodity

market

lack of alternative

sources of supply

only minor suppliers available

reduced production

fire at the plant

14

about how to carry out threats against a firm and the “wheel of crises” whereby certain possible

consequences of crises are discussed where the wheel stops.

Risk Assessment, evaluation and prioritization

Risk analysis or the assessment of a risk event is nothing else then weighting or measuring the

subjective probability of a risk event and the potential consequences of it from the viewpoint of the

enterprise. In a later stage companies should tailor the responses and strategies will be taken to

reduce either their probability or their consequences.

These two aspects can be used to develop a risk map or a risk criticality matrix: the probability or

sometimes called the criticality index (how critical is a possible risk for your company) and the impact

or several severity classifications.

Negligible impact Marginal impact Critical impact Catastrophic impact

Low Least Emphasis

Probability

High Most Emphasis

Table 1: risk criticality matrix

The aim of this matrix is to evaluate each risk on their emphasis and ultimately prioritize this risks to

mitigate and map them in the matrix. Griffis and Whipple (2012) notices an incomplete picture and

suggest that the probability of detecting these risk factors should be admitted in the traditional two-

by-two matrix used by many other authors. (see also risk aspects). How can this additional factor be

integrated? This is done again with a two-by-two matrix.

Figure 7: risk matrix for the additional probability of detecting risks

The manager can, for a specific risk factor, assess the ease in which the occurrence of that risk factor

can be monitored (from easy to difficult) on the x-axis. On the y-axis, the lead time, from short to

I

Least Emphasis

II

III

IV

Most Emphasis

15

long, between detection and realization of the risk is depicted. For example if our metal supplies

come by ship you have to take care and map several sources of risks. An example of the first

quadrant can be a mechanical failure because it may have little to no advance warning of problems

but once occurred in most cases the technical staff is capable in solving these kinds of failures.

Weather fluctuations like a dangerous storm are immediately detected due to the accurate weather

forecasts nowadays such that a vessel is able to take an alternative route and avoid the storm. The

risk of piracy at last is difficult to monitor and characterizes with an immediate recognition of the

detection, resulting in greater emphasis.

Sometimes the firm can draw a tolerance threshold line that divides the risks you will manage

actively form those that will not be managed, after which the risks identified are sorted by expected

loss (P. G. Smith & Merritt, 2002). In other words, the company selects the maximum risk criteria it

can afford. That’s another way of prioritizing risks when the firm has to cope with a lot of risks,

especially minor risks. Prioritization is important as firms often focus only on recurring but low-

impact risks at the expense of paying attention to high-impact but less-probable risks (Griffis &

Whipple, 2012).

In a further stage risk can also be compared against the selected risk evaluation criteria (Mullai, 2009)

and further be ranked by criticality or severity.

For the assessment and estimation of a catastrophe the use of simulation and optimization can be

recommended (Knemeyer et al., 2009). Other estimation methods are for example the opinion of

experts combined with historical data, suitable for aircraft incidents or with the opinion of decision

makers, eligible for other types of catastrophic events like nuclear reactor meltdowns. The game

theory whereby an optimal strategy has to be determined between the objective function of the

attacker and the constraints of the firm can be used to simulate terrorism. The output of these

approaches should be a list of key locations with estimated potential loss values.

Risk Management Actions and Mitigation strategies

Much research is done about management actions, strategies and action plans against risks. An

attempt to give a reasonable overview follows. (Kleindorfer & Saad, 2005) (Manuj & Mentzer, 2008),

(C. S. Tang, 2006), (Griffis & Whipple, 2012))

Under risk management actions we understand the general used strategies towards the risks

perceived. They are risk taking, risk transfer, risk reduction and risk elimination respectively. Within

each risk management action several mitigation strategies can be used in succeeding this action.

16

Firstly managers can choose to take the risk. Reasons therefore can be that the risk may be perceived

to be low and the company is willing to accept the risk because of very little consequences for the

firm. According to two German researchers, during the financial crises times, a lot of companies

accepted their risks in this country. This was more the case with manufacturing companies. But after

the crisis these companies shifted towards a more comprehensive approach of risk mitigation. This is

in contrast with service companies who despite the crisis stayed to perform more risk acceptance

strategies (Blome & Schoenherr, 2011).

Alternatively, managers can opt to transfer their risks from one company to another or subdivide

their risks over several companies. This may reduce the total risk in the network if the company takes

the risk can cope with it better than the company transferring it resulting in having a large supplier

network. But the downsides of this risk are the high switching and administrative costs and their

availability when changing from supplier. These are therefore part of transaction-specific

investments. Furthermore it may decrease opportunities to achieve economies of scale.

Furthermore risk can be shared in contracts with the intention of better coordination with channel

partners, collaborative forecasting and collective replenishment planning which increase supply chain

visibility and encourages further analysis of individual risks. They can be managed generally by

developing a common network strategy, sharing best practice modes of action and contract policies.

Moreover, several situations exist that there might be some risk but the company takes the needed

effort to reduce it as much as possible. A common used mitigation approach could be the use of non-

performance penalties built into contracts. If our metal part supplier doesn’t succeed to deliver the

demanded parts, price reductions will be used as stated in the contract.

Examples of other security mechanisms used to reduce risk include monitoring techniques, such as

audits of supplier’s quality checks, inspections of random materials, and tracking of key performance

indicators (KPI’s).

At last, risk elimination may be appropriate when the firm cannot live further with this risk and must

be completely discarded. AVIA decided to quit assembling their aircraft parts with that old machine

that produces much defects.

Sometimes choosing an appropriate risk strategy means changing current operating models or

practices. This means that you systematically review your ‘inventory’ of risk procedures and controls

with the aim to improve risk management practices. An example is the centralized versus localized

approach of manufacturing to mitigate risks and increase benefits.

17

Table 2: risk management actions

To deal with catastrophic events the company can draw a catastrophic risk management matrix

which maps the key locations in the same manner as normal risks to detect appropriate risk

strategies for each threat on the list like for example move a location, buy insurance, assume risk and

so on (Knemeyer et al., 2009). Chaos theory may additionally provide some help to formulate

appropriate catastrophic risk strategies.

Wagner and Bode (2009) makes a difference between cause and effect oriented supply chain risk

management practices. The first are preventive in nature. We think of information security, physical

security and freight security. For example AVIA can switch in advance to a more financial stable

supplier to reduce the risk of a sudden supplier default. Or the company can relocate their

manufacturing plants to safer regions to avoid natural hazards like tropical storms or tsunamis near

the coast. The second practice contains measures aiming at minimizing the level of damage in case of

a risk event occurrence, e.g. insurance companies. The disadvantage of these companies is that they

do not always understand supply chain risks and it’s difficult for them to insure a company’s own

facility against disruptions from their suppliers at multiple locations. But there seems to be progress

in this field: They are now providing business interruption insurance for disruptions occurring at a

supplier’s facilities (Alvarenga & Lehman, 2012) for named suppliers but unfortunately don’t cover

the whole network of suppliers and subcontractors.

Buffering strategies, financial risk reserves and product redesign are other examples of this practice.

Most of the risk handling activities proposed in the literature are rather effect-oriented than cause-

oriented.

As risk mitigation strategies require costly investments in equipment as well as human resources, it is

important to know which mitigation strategies offer the greatest protection from risks in a certain

situation.

risk taking

• ignoring the risk when developing a mitigation strategy

risk transfer

•large supplier base

risk sharing

•channel coordination

•collaborative forecasting

•collective replenishment planning

risk reduction

•non performance penalties

•audits of supplier's quality checks

risk elimination

•remove machines

•stop operate unhealthy production processes

18

A possibility for determining the favorable assessment costs is mapping them against the benefits

from risk mitigation strategies, stated in the framework of Shavell (Kleindorfer & Saad, 2005). This

results in a tradeoff between the cost of acquiring reliable information on risks and the benefits of

mitigation activities. At optimum, a balance must be struck between the marginal costs and benefits

of better risk assessment.

So when do we have to use these mitigation strategies? Risk identification and assessment give a

more specific indication on where to focus the actions. According to Griffis and Whipple (2012),

strategies such as monitoring and risk taking can be used when the likelihood and potential impact

are low and the ability to detect the risk is easy. When selecting a monitoring strategy, either risk

reduction or elimination, you can choose to perform random inspections of products to detect errors

or the risk maybe perceived low so that managers could choose to take the risk. When the opposite

is true, more aggressive risk mitigation strategies like complete risk elimination need to be

considered. Examples here are avoiding dangerous shipping routes or to quit outsourcing and to

manufacture the product in-house to have more product and process control.

If the likelihood of a risk occurring is low and detection may be easy, but the impact of the risk could

be significant, then a postponement strategy may be appropriate if the event causing the risk can be

postponed until more control by the focal firm is established. More control can be established

through vertical integration or imposing contractual obligations on suppliers (Jüttner et al., 2003).

The clearest example of a postponement strategy is producing in modular form. The advantage is

that you can push your semi-finished product from surplus to deficit areas. A company that uses a

postponement strategy is the computer manufacturer Dell. They produce computer hardware in

modular form and let their customers and firms decide which functionalities and properties they

must contain. One can also perform a demand postponement strategy and shift the demand across

products towards their customers (C. S. Tang, 2006) such as a price strategy.

The opposite of postponement is called speculation or also called selective risk taking and is also an

option here. When you perform a speculation strategy, you build up inventory to buffer against the

specific risk.

In cases where impact of a risk may be low, but likelihood of occurrence is high, and the ability to

detect the risk in advance is difficult, a firm may select an imitation strategy and source with the

same supplier because if one firm is exposed to this risk, all firms are.

A flexibility strategy at last could be used when the likelihood of risk occurrence is high and detection

is easy. This could be achieved through multiple sourcing. This strategy requires some adaptation for

19

the company because in a general culture where the focus lies more on core competencies and value

creation more single sourcing relationships have emerged (Blome & Henke, 2009). Strategic

partnerships and alliances are an example of this sourcing strategy. Secondly, companies don’t have

always the choice to choose between single and multiple sourcing. For example, when you have the

choice of only one supplier, because of intellectual protection, then you have a sole sourcing

relationship. This mitigation strategy is sometimes called hedging in a supply chain context because

the company has a globally dispersed portfolio of suppliers.

Another way to provide flexibility is the adoption of standard processes and the use of

interchangeable and generic or modular parts. Finally using simultaneous instead of sequential

processes in key areas as production/distribution speeds up the recovery phase after a disruption.

Figure 8: risk mitigations strategies

Tomlin (2009) determines also the optimal adaptation strategies when probability of supplier and

customer failure is high or low. The used strategies are supplier diversification, contingent sourcing,

which is adding a supplier which is only used in case the main supplier fails to deliver and demand

switching. Diversification should be executed when demand uncertainty increases. Furthermore

when the firm faces an increasing supplier failure probability or faces a high level of risk aversion it

should opt for a contingency strategy. Demand switching is appropriate in case of a low supply risk.

Mitigation strategies can change over time. Suppose company AVIA is plagued with several recalls for

their assemblies because of metal parts affected with corrosion in an earlier stage. Because it isn’t

always easily detectable, current employed postproduction testing is no longer efficient anymore.

Rater than a strategy of control, through frequent testing, a strategy that uses severe penalties with

20

their suppliers for recalled products is more appropriate. Another possibility can be to use an

elimination strategy and look for another supplier.

After the appropriate mitigation strategies are determined, it is recommend developing prevention

and contingency plans to reduce the risk in likelihood of occurrence and impact severity. Wagner and

Bode (2009) suggest that continuity or recovery plans are important tools to ex-ante optimize the

‘firefighting’ after a disruption. These contain for example the radical design of products and the

layout of the manufacturing processes.

As a review to the selected mitigation strategies, some principal criteria can be addressed: efficacy or

the degree to which risks are eliminated, feasibility or the aligning of the right mitigation strategy to

the appropriate risk and efficiency which relates to the cost-effectiveness which was explained above.

Risk Monitoring and Strategy Sharing

Monitoring your risks means identifying the potential increasing trends in their probability or

consequences in the future. After implementing mitigation strategies you will find that some risks

are closed where the risk event has been prevented or other risks remain where the risk event had

happened despite the prevention plans implemented (P. G. Smith & Merritt, 2002). Nowadays

companies can employ real-time risk monitoring capabilities along with techniques to track key

supply chains flows. These tools can speed response in case of numerous unplanned events. A lot of

electronic and high-tech companies, who have very dependent supply chains, have integrated these

tools into their standard supply chain management practices. Improving the traceability of the supply

chain leads to organizations that follow key performance indicators through the entire supply chain

and consequently identify risk not only with their first-tier suppliers but also with their sub-

contractors ((Alvarenga & Lehman, 2012), see also supply chain security).

A company first follows the risk management steps described above and analyzes its network-related

risks internally. In the second phase the partners should identify the areas of risk management that

require joint effort and where risks strategies should be shared.

As enterprises are connected in a network, they are dependent on each other so it can be useful to

share entirely or partially risk management processes and to develop collaborative means to manage

the risk and communicate their views on risks. It is important that the individual risk management

processes are supplemented by a collaborative process. Sheffi (2005) even argues that competitors

should collaborate to control common risks.

21

Moreover in complex network environments mutual risk identification and assessment can be seen

as tools for creating the risk profile of the entire network on the basis of the partners' risk profiles

(Hallikas et al., 2004). The primary tool employed by the Japanese to implement closer supplier co-

ordination and individual supplier development is cross-exchange of staff between buyers and

suppliers.

This requires the benevolence of the enterprise of exchanging inter-organizational information

towards risks & rewards sharing and knowledge transfer. But it gives the firm the possibility to

perform a benchmarking exercise and it generates supply-chain wide visibility of vulnerabilities and it

should give the firm incentives to identify and implement disruption management systems.

Conclusion

Now that we have briefly described the risk management process framework, one can argue of its

need. As risk mitigation strategies require costly investments in equipment as well as human

resources, it is important to know if these strategies pay off towards risks of all kind. As Jüttner et al.

(2003) noted, there is a supply chain trade-off decision between delivering high customer value and

managing possible risks. A trade-off between extra risk mitigation costs and less costs of delivering

high quality and on-time products as a main principle of supply chain management.

Kleindorfer and Saad (2005) investigate if investments in risk management activities yield towards

frequency or severity of accidents. With the use of variables like regulatory programs, facility

characteristics and community demographics, they determined whether observed accidents in the

chemical sector decreases with the use of these risk programs as mediator variables as a

consequence of more severe regulatory programs, more hazardous facility characteristics or the

financial structure of the company. The investigation indeed found evidence of this relationship.

Dani (2009) suggests this risk management framework must be an iterative process and should not

stop with one investigation of risk but instead repeat the exercise to study new issues and risks

identified after the analysis of the event. Furthermore this exercise must be aligned at the strategic

level of the company and according to the strategic objectives to have a clear understanding.

Concluded, it is important to update the possible risk sources and strategic objectives in line with the

risk event or mitigation strategies that may be adapted according to possible new discovered risk

issues (Dani, 2009). We will further see that the adoption of a risk management strategy will foster

the use of a proactive supply chain approach. Mullai (2009) takes it a step further and claims that the

process can start at any point. The major steps of the framework (risk analysis, evaluation and

mitigation) are interactive, change-responding, can be accomplished simultaneously and are aligned

through risk communication (Mullai, 2009).

22

2.2 Supply Chain Management

The first definition of the supply chain management is dated from the early 1980’s and compromises

the following:

“a ‘standard’ supply chain is a system compromising of materials, goods and information (including

money), which pass within and between organizations, linked by a range of tangible and intangible

facilitators, including relationships processes, activities and integrated (information) systems” (Peck,

2006)

While our approach is not to give a full overview of the supply chain with all his aspects, we will

nevertheless give you some information of some practical aspects in this domain that can be linked

or have relationships with the risk management domain.

Bullwhip effect

An important issue for the supply chain is that you have to take into account the major consequences

of the Bullwhip effect. Essentially, the bullwhip effect depicts the phenomenon in which the orders

exhibit an increase in variability up the supply chain, even when the actual customer demands were

fairly stable over time (Sterman 1989; (C. S. Tang, 2006). Cisco systems Inc. wrote off 2.5 billion in

inventory due to a lack of communication among its downstream supply chain partners (Spekman

and Davis, 2004(C. S. Tang, 2006). The increase in variability of the orders up the supply chain can

cause many problems for the upstream partners including higher inventory, lower customer service

level, inefficient use of production and transportation capacities, etc. The more distance between

suppliers and the final consumer in the supply chain, the more these demand changes are

compounded (Fine 1998; Lee, Padmanabhan, and Whang 1997(C. S. Tang, 2006). In order to mitigate

the bullwhip effect, one needs to identify the root causes (C. S. Tang, 2006) which can be done in the

first step, risk identification, of the risk management process.

Secondly, many companies have switched from “local” suppliers to “low cost” and often distant

suppliers on the basis of overhead cost optimization, without considering the cost of risks caused by

this strategic change. Larger companies now buy from smaller suppliers in very remote areas of the

globe. The extended supply chain now has many additional points of potential failure, enlarging the

bullwhip effect and requiring new approaches to risk management. Companies face longer logistics

lead times as well as new and unfamiliar risk profiles encompassing natural disasters, epidemics, and

social, political or monetary instability (Alvarenga & Lehman, 2012).

23

An agency theory perspective

The agency theory perspective justifies the differences in the objectives and risk preferences of the

two parties: the principal (purchasing organization) and agent (suppliers), as well as information

asymmetries. Both parties undergo an agreement with risk sharing (Zsidisin & Ellram, 2003).

The aim to consider the relationship in this perspective is to reduce the purchasing firm’s risk of

moral hazard and adverse selection. The first means the risk of the lack of the supplier, aware of not

by the purchaser, to lever the agreed upon effort to meet customer demand. Adverse selection

means the inaccurate assessment or misrepresentation form the purchaser of the sometimes

unknown supplier abilities to meet customer requirements (Zsidisin & Ellram, 2003). An example of

moral hazard is the unwillingness to further invest in appropriate infrastructure needed to produce

the metal parts for AVIA. An example of the latter is that AVIA, unaware of the major investments in

new metal production equipment, keeps further purchasing the parts from old machinery that are

produced with minor quality.

In essence, suppliers and buyers have to be aware of opportunistic behavior risk. This comes down to

the breaking of their mutual informal agreements & contracts between the partners within the

supply network in the pursuit of competitive advantage and profit (Seiter, 2009). The author

proposes action programs like more communication quality, better partner selection and mutual

sharing of cost accounting information to reduce opportunistic behavior directly or indirectly through

reduced information asymmetry.

Make-or buy decision

Don’t try to force the manufacturing of complementary assets in-house when you can outsource

particular needed competences in a more cost-advantageous way. For many companies, “make or

buy” decisions have been chosen in favor of buying, not making. While this reduces manufacturing

overhead costs, companies lose oversight of key governance and management competences and

strategies. As a consequence this might introduce unknown (new) risks into the supply chain.

Periodic risk rebalancing is therefore essential (Alvarenga & Lehman, 2012).

Outcome-based versus Behavior-based management techniques

In order to align the objectives of both agents and principals several management techniques or

practices are available. These can be split in two categories (Celly & Frazier, 1996; Zsidisin & Ellram,

2003).

Outcome-based management techniques address the importance of coordination of outcomes and

results such as sales growth or sales in relation to targets. According to Zsidisin and Ellram (2003), the

24

use of buffer oriented techniques is an example of that group. Inventories can be held either by the

purchasing firm resulting in internal safety stock or by suppliers which is supplier-managed inventory,

or both. Rather than reducing the likelihood of a harmful event, firms employ buffers to reduce the

disruptive effect of supply risk events. Therefore this approach is short-term oriented.

Behavior based management techniques addresses behaviors such as customer education activities

or selling techniques with distributers from the supplier personnel thereby signaling important

objectives and suggesting specific distributor actions (Celly & Frazier, 1996). It focuses on processes,

emphasizing ‘task and activities” that lead to a reduction in supply risk and is therefore long-term

oriented.

The findings of Celly and Frazier (1996) were that supplier personnel rely too much on outcome-

based efforts when coordinating relationships with distributors. Zsidisin and Ellram (2003) on the

other hand found that there exists a partially positive relationship for behavior techniques with

perceived supply chain risk and this was not supported for buffer oriented techniques. The

implementation of buffers is done regardless of the extent of perceived supply risk.

Although each of the efforts has its downsides, outcome-based may be sometimes inappropriate in

some situations and behavior-bases may be sometimes costly to the firm. An emphasis solely on

maintaining buffers to manage supply risks can harm business profitability due to capital devoted to

inventories and Celly and Frazier (1996) find the risk of demand fluctuation is being positively related

to behavior-based management efforts. On the other hand buffers give you a form of assurance and

behavior based contracts facilitates communication and mutual goal alignment. An inclusion of the

two efforts will be optimal.

Examples of the management techniques are given below:

Outcome Buffer Behavior

- communication about sales

growth, market share, …

- managing inventory

- supplier certification

- quality management

programs implementation

- target costing

- supplier development

The advantage of supplier certification is that they reduce the need for the purchasing organization

to conduct time-consuming inspections. Implementation of quality management programs is also an

25

option but certification improves already the abilities of the supplier to satisfy the quality

expectations of the purchasing firm. Also target costing is interesting where supplier and purchaser

determine ways to drive cost out of its products. At last supplier development can meet the

purchasing organization’s short or long-term supply needs.

Behavior-based efforts may be predominant in franchise channel systems because inter-firm

interaction should be relatively high and relationship termination is more difficult. In conventional

channel systems, outcome-based efforts may be predominant because of the need to keep

coordination costs down. In addition we will find more buffer-oriented approaches within the use of

transactional supplier relationships whereas the use of behavior outcome-base approaches is more

adopted with cooperative supplier relationships (Blome & Henke, 2009).

Making your supply chain redundant versus flexible

According to Sheffi and Rice Jr (2005), the following difference can be made. Redundancy activities

include safety stock, the deliberately use of multiple suppliers or back-up sites. Adding redundancy is

in a way needed for every day’s operability but flexibility strategies on the other hand gives more

competitive advantage in the marketplace. Flexibility can be seen from 3 facets: supply, in-house

conversion and distribution. It aims first of all on correct alignment of the supplier relationship with

the procurement strategy whether you opt for a single supplier or for multiple suppliers or for a

single supplier for each critical part. Secondly using standard processes and having multiple locations

with built-in inter-operability. This allows a firm to operate in another plant once one is disrupted or

the replacement of sick operators. On the customer or distribution side at last, managers face a

choice about which customers to serve first after a disruption. Managers can thereby decide on

several criteria like the vulnerability, the profitability and costs of all customers. Strategies like

postponement or producing semi-finished products, described above, can be used. Managers in

addition are often reluctant to invest in flexibility measures because they don’t see directly or hardly

can estimate the impact on risk mitigation (C. Tang & Tomlin, 2009). So unlike redundancy, flexibility

can also improve the competitive advantage of companies in times without a disruption. Flexibility at

last is indeed important when your company executes a lot of projects because the project manager

must be able to change or redefine several aspects during project execution. Furthermore projects

ensure the coordination between client, contractor and supply chain. Hence, project execution

translates into flexible management. But gaining more on flexibility and consequently efficiency

implies the risk of losing sight and therefore as we have seen before can increase vulnerability.

Companies producing components for the automotive sectors are an example of industries that

focus on project management (Gaudenzi, 2009). It provides a risk management framework that is

also applicable for projects.

26

C. Tang and Tomlin (2009) investigates how much flexibility is needed to mitigate supply chain risk.

On the basis of mathematical models they conclude that only a small amount of flexibility strategies

(e.g. multiple suppliers, flexible supplier contracts, postponement, responsive pricing and flexible

manufacturing processes) is required to mitigate risk.

From their PWC research (Levi et al., 2013), it seems that companies focus on flexibility and customer

service levels on the one hand and other companies on cost reduction and efficiency on the other

hand. It seems according to their study that those former are better coped against risks (appendix).

It’s also worth noting that 80% of the cost-efficient companies face high variable supply chain lead

times given that low variability is mostly one of the key drivers of an efficient operating strategy.

The resilient supply chain

Once gone through all the major risk management steps and approaches the ultimate goal is to build

a resilient supply chain. A supply chain that is both able to absorb disruptions and risks, can

proactively manage its supply chain and sees a possibility to turn the threats of a disruption in a

major advantage can be seen as a resilient enterprise. Resilience is not the same as robustness. The

robustness of a company is the ability to resist from an accidental event, retain to its same stable

situation as it had before and stick to his initial mission (Asbjørnslett, 2009). In contrast resilience

aims at a new stable situation and has the adaptive ability instead of being resistant. Building a

resilient enterprise should be seen from a strategic level and changes the way a company operates

and increases its competitiveness. Two important aspects determine a company’s resilience (Sheffi &

Rice Jr, 2005). First is the market position. Is the industry competitive or has the company a lot of

market power? Else it depends on the responsiveness of the supply chain. When companies are not

so responsive they might risk losing market share. Responsive companies otherwise can increase

market share or once they have a reasonable amount of market power they can lock in their

leadership.

Corporate culture

In the search for the resilient enterprise, it is important not to underestimate the contribution of

culture to an organization (Sheffi & Rice Jr, 2005). Empowering front-line employees to take initiative

and guide actions is a possible step in building a suited corporate culture. Secondly Japanese lean

principles from the Toyota Manufacturing System can be used like Poka Yoke and Hijunka. These

concepts are in essence that one must learn from errors and fixe the root causes. Companies can

minimize the risk of possible disruptions by paying attention to small problems as indications of

major disruptions. At last continuous communication between all layers of a company can foster the

good working of the company.

27

To encourage the need and use of risk management a disruption can be simulated and employee

reactions are monitored and used in training (Kleindorfer & Saad, 2005; Sheffi & Rice Jr, 2005). This is

the exercise of role playing with red and blue teams. The red team represents in most cases

competitors, rivals or supply chain experts, equipped with whatever information is available. They

attempt to attack the supply chain to cause major disruption. On the other hand you have the blue

team who tries to mitigate or countermeasures those actions which are cost effective against the

Red Team scenarios. This way of training can enhance the risk culture in the firm. This lacks yet in a

lot of firms according to the authors of the paper from Cagliano, De Marco, Grimaldi, and Rafele

(2012).

Sheffi (2008) proposes that governments can introduce cultural aspects into disruption mitigation.

Cultural changes on a societal level happen several times every century so the government should

encourage and drive these trends to improve resilience along the chain.

2.3 Supply Chain Risk Management

Research in supply chain risk management is still in an early stage and has been around for about a

decade now. As a consequence here is a huge diversity in topics, opinions, and research

methodologies in the field of supply chain risk management. Furthermore there is still a lot of

variation towards the meaning of supply chain risk management according to several established

focus groups. According to them, supply chain risk management is seen as a subset of Supply Chain

Management (SCM) and also as a subset of Enterprise Risk Management (ERM) which can be seen in

the figure below. But what compromises the field of supply chain risk management (Sodhi, Son, &

Tang, 2012)? Supply chain operations and risk management processes go hand-in hand and

complement one another.

Figure 9: the concept of Supply Chain Risk Management (Blos et al., 2009)

According to Wagner and Bode (2009), Supply chain risk management (SCRM) contains the field of

activity seeking to eliminate, reduce and generally control pure risks in supply chains. But what do

28

these risks contain? According to the focus group from the research from Sodhi et al. (2012), risks in

this field should concern majorly with dealing with unknown events or dealing with disruptions or

disasters with low probability and high-impact. This was the opinion of almost the half of the

researchers. Secondly it should concern dealing with risk within supply chain operations, according to

20% of the researchers (Sodhi et al., 2012).

Kajüter, 2003 states: “Supply chain risk management is a collaborative and structured approach to

risk management, embedded in the planning and control processes of the supply chain, to handle

risks that might adversely affect the achievement of supply chain goals.” In this definition the focus is

rather laid on the supply chain. Norrman and Lindroth, 2002 assess the focus of supply chain risk

management more on a practical approach. Supply chain risk management can be defined as, “to

collaboratively apply risk management process tools with partners in a supply chain to deal with risks

and uncertainties caused by, or impacting on, logistics related activities or resources”

Nevertheless this concept is still missing many pieces that have to be found and linked together to

get a comprehensive approach of supply chain risk. SCRM is often not always established as a distinct

function or department in companies. Businesses do not agree on how to integrate these risks into

their decision-making processes, the risk function is typically “headquarters-centered” and there

seems not be a risk regulation that covers the supply chain. However it’s necessary to integrate risk

management into operations, strategic and sales planning.

The work from Jüttner et al. (2003) summarizes well the concept:” “the identification and

management of risks for the supply chain, through a coordinated approach amongst supply chain

members, to reduce supply chain vulnerability as a whole.” And can be summarized using the figure

from them.

29

Figure 10: a SCRM framework

As a consequence it shouldn’t come as a surprise that research in this field leads to often

unambiguous conclusions and a large variety of results. But SCRM implementation has brought up:

Ericson has implemented a SCRM matrix organization that spans the entire company, from the

corporate and strategic level to the functional and finally process-oriented operational level.

It’s in addition worth to address the importance of smaller companies. Most SME’s are more exposed

to supply chain risks whilst simultaneously disadvantaged by lack of management resources,

structures, processes and expertise as opposed to bigger firms (Henke, 2009; Jüttner & Ziegenbein,

2009). In essence, for SME’s the adoption of a comprehensive risk management program can be the

same except for some aspects due to their limited possibilities. Whereas larger firms can have the

time and the access to control all their supply chain partners not strictly limited to 1st tiers, SME’s are

encouraged to select their most important one for further investigation. In most cases information is

gathered from their personal network and there is no planned supplier data collection but instead

these companies rely more on social interactions with their suppliers (Ellegaard, 2008). It’s not

practical for them to map their entire supply chain (Jüttner & Ziegenbein, 2009). Consequently

before the risk identification process, Jüttner and Ziegenbein (2009) require the mapping of supply

chain vulnerability against their strategic importance to investigate. Furthermore the adoption of

expensive risk management tools is not always value adding for them. That is because tools often are

designated for specific tasks and are highly sophisticated and therefore not always suitable for SME’s.

In summary a 3-phase risk management approach for SME’s is given.

The tactics towards the risk aspects are according to a case study from Ellegaard (2008) as follow:

probability reduction has the highest priority and effect reduction through multiple sourcing was not

30

practiced at all. Also small companies don’t gather much information from their partners that can

help reduce risk.

A company must regularly check their activities in a manner that they fulfill their strategic objectives

dictated by the firm’s vision. A framework that can aid to measure performance is the Balanced

Scorecard of Kaplan and Norton. Their model doesn’t contain only financial objectives but

incorporates also internal, customer and innovative & learning perspectives. When dealing with

supply chain performance, no primary use of financial performance measures is advised (Sheffi &

Rice Jr, 2005).This framework which focuses on performance measurement as a consequence should

be integrated with supply chain risk management. Risk and performance are directly related because

the higher the risk taken the higher the expectation of suitable returns (Sheffi & Rice Jr, 2005). As

more resources and attention is given to supply chain risk management an aligning with performance

management is indispensable.

Besides the electronic multinational Ericsson (Norrman & Jansson, 2004) another company that has

successfully implemented a risk management strategy and accompanying supply chain culture is the

Nisan Motor Company (Schmidt & Simchi- Levi, 2013, (Levi et al., 2013)). After serious harmful

problems due to an earthquake and Tsunami in Japan, they incur a $ 200 billion loss. “Nissan’s

production capacity was perceived to have suffered most from the disaster compared to its

competitors.” But the company managed to increase their production with 9.3 % in comparison with

an overall decrease with its competitors. How was this company able to manage this?

First they implemented an integrative risk management framework with risk identification as early as

possible, assessment and performed countermeasures against them. Second the plant has

formulated a continuous ready plan with their suppliers. Moreover the team was empowered with

local decision management. In addition the company structured its supply chain as flexible as

possible. At last, there was extended enterprise visibility and warnings to between internal and

external business functions (Levi et al., 2013).

2.4 Supply Chain Security Management

Supply Chain Security Management (SCSM) is defined as “the application of policies, procedures and

technology to protect supply chain assets from theft, damage, or terrorism and to prevent the

introduction of unauthorized people or weapons of mass destruction into the supply chain. Security

practices can be control measures implemented in several processes and certainly at several gates

throughout the supply chain where products arrive (Voss & Whipple, 2009).

31

The difference with Supply chain risk management is the fact that Supply chain security management

focuses more on prevention of contamination, damage or destruction of the supply chain assets and

products by policies, procedures and technologies whereas the former investigates more the

likelihood of outcomes being susceptible to disruptions that can damage the supply chain (Autry &

Sanders, 2009). This paper provides a dynamic capability framework that can be used to implement

security practices. These capabilities include processes, technology and human resources. For

example the use of radio frequency identification is a technology capability. With the use of the

Radio Frequency Identification (RFID) technology and their tracking and tracing capabilities, abilities

rise to identify disruptions quickly. Furthermore sensitive control systems often can identify a

disruption before its cause is apparent.

The management of inventory is an example of a process capability and governmental security

initiatives are human resource capabilities.

The problem with risk mitigation activities, in particular those that don’t start at the place of original

production, is that technical control allows hidden action of participants in the process chain (Mau &

Mau, 2009). Therefore a supply chain wide security control system or management is needed. A

comprehensive control platform is required to manage supply chain security effectively. The goal for

supply chains, those that doesn’t consist of a complex network or single supply chains, is to secure

worldwide and realize complete traceability of all involved products and inputs at all the supply chain

levels resulting in continuous transaction data in both directions, upstream and downstream. To

trace all the necessary information, it is useful to make use of an independent database. In this way

effects on the products of your firm can not be overseen thanks to a centralized data management

system.

The basic thought for implementing security initiatives are basically the same as for the use of risk

mitigation strategies. Advanced or high proactive security initiatives pay off and improve security and

firm performance but most firms have not progressed beyond basic physical security measures such

as infrastructure management and therefore have not derived the service benefits from higher level

security measures (Voss & Whipple, 2009). Consequently this creates a dilemma in an optimal

tradeoff between cost of implementation and efficiency of the initiatives but also for firms that face

greater customer or government requirements. More security improvements sometimes can lead to

a decrease of flexibility and firm performance but aim to create a secure supply chain that maintain

advanced security processes and procedures.

32

2.5 Conclusion

Concluded, risk mitigation measures can be seen and implemented from 3 different levels. The

strategic level which focus on for example alternative suppliers, at the tactical level (e.g. improved

demand forecast) as well as the operational level (e.g. business continuity plans).

Although risk management practices and business continuity planning is left too much to security or

insurance professionals in companies, it should be noted as a strategic initiative and must be

implemented in an integrated risk framework approach. As a consequence this risk practice helps to

build a resilient enterprise and supply chain.

33

3 Conceptual framework

The goal of this work is to determine how several environmental aspects (e.g. market size, bargaining

power) may have an impact on the managers or the firm’s risk perception by which we mean the

probability of risk and their impact. Furthermore we investigate if these perceptions might influence

risk mitigation strategies performed by the firm. In particular we will make the distinction between

more proactive versus more reactive performance towards risks. At last we want to examine if

certain mediators and moderators do play a role in selecting that particular strategy. On the one

hand we dive into how varied a firm does perform supply chain management practices and their

choice towards risk management. On the other hand we look at the design and the complexity of the

supply chain and see if any conclusions can be made with this aspect towards risk. While previous

research (Ellis, Henry, & Shockley, 2010) has determined the impact of environment on risk

perception, investigation towards the use of proactive versus reactive management is still a gap in

the literature that hasn’t been explored yet. Instead Ellis et al. (2010) investigated overall supply

disruption risk towards the search of alternative sources of supply.

3.1 Environment

Several papers deal with the environment as an important factor for the determination of risk (Ellis

et al., 2010) (Ritchie & Brindley, 2009). Ellis et al. (2010) chooses also for the integration of some

environmental factors like technological uncertainty and market thinness but also for some company

specific characteristics like item customization and item importance. The environmental construct

here proposed is as follow:

PEST-analysis

An exercise for the company in determining the strength of the environment and the external factors

can be the adoption of a so called PEST analysis. This analysis contains the macro-environmental

aspects of Political forces, Economic forces, Social forces and Technological forces. It’s an

environmental scanning component that can help you to determine trends outside the venture. The

purpose is to detect driving factors and uncertainties.

34

Figure 11: PEST analysis

Porters competitive model and SWOT-analysis

A second approach to identify your environment is the so famous Porter’s five forces model. This

framework provides you and let you think about you’re major outside forces that come into play with

your venture and determines the dynamic tensions between players. The aim of this tool is to

perform a competitive analysis because each player may have a sufficient amount of power. It

highlights problem areas as well as possible opportunities or whether you have a competitive

advantage or you have to accept a reasonable amount of risk. An exercise that can complement this

investigation is the SWOT-analysis (Strengths, Weaknesses, Opportunities and Threats). The threat

of potential new entrants can limit your own company’s activities but there may be entry barriers

that could prevent them to start doing business. Second, suppliers may have bargaining power that

impacts your business such as a unique product they deliver to you that requires a high degree of

specification and specialization. Customers likewise may have power too over your business for

instance if they are able to integrate backwards into the supply chain (e.g. manufacturing your

product themselves). In addition there may be a threat from substitute products. Note that this

doesn’t contain physically the same products but may also encompass a different transportation

mode like for example plane versus car. Substitute products can be more or less attractive depending

on for example the switching costs a customer must pay. For example the adoption of a new product

would require the customer to buy new equipment or additional software and so on. At last, existing

rivalry among industry players can make your environment very turbulent. If there are many

•technological pace

•adoption cycles

•R&D

•education

•demography

•work aspects

•financial markets

•economic cycle

•change of industry and markets

• laws & regulations

• political (in)stbility

• government spending

Political Economic

Technological Social

35

competitors and there is little product differentiation, the resulting strategy in your industry will be

price competition.

Figure 12: Porter's Five Forces Model

Market variables

At last we introduce some market variables that also can be perceived from the environment and are

important for the firm. First we account for the perception of the market size: “is it growing or

declining rapidly?“ Moreover has the industry market many or few segments resulting in a

company’s market span. In addition, “has the industry many or few competitors?” This describes the

market concentration. At last, we can focus on the ease to enter the market. “Is it open to new

players or closed to new players?”

So concluded, our first hypothesis will be:

Hypothesis 1: Environment constructs – Risk perception relationship

H1: there is a significant relationship between Market-variables, some PEST-analysis variables &

PORTER-analysis variables and the probability of risk and their impact.

3.2 Risk perception or representation of risk

Risk perception is defined as the decision maker’s assessment of the risk inherent in a situation (Sitkin

& Pablo, 1992). This refers to the assessment stage in the risk management process described earlier.

36

Prior research has already proved the relationship between risk perceptions and risk behavior

although as a mediator between risk propensity and risk behavior (Sitkin & Pablo, 1992).

We will reinvestigate this relationship but consider the perception in both risk probability and risk

impact.

Hypothesis 2: Risk perception – Risk management relationship:

H2a: there is a relationship between the risk perception of risk probability on the choice of pro versus

reactive management.

H b2: there is a positive association between a higher perception of risk impact on proactive as well as

reactive management and the relation on proactive is stronger.

We opt to choose the aspects of risk, impact and probability, from a perception point of view rather

than objective assessments of risk. That is because a manager will take decisions on the basis of his

perceptions of degree of risk and which actions he will do. Risk perception is dependent from several

aspects: as earlier stated risk is dependent on how the problem is framed and the problem domain

familiarity. Furthermore an individual’s propensity towards risk also influences the perception. At last

the homogeneity of the management team and organizational control systems come also into play

(Sitkin & Pablo, 1992).

We represent the risk from 3 perspectives. First from a supplier point of view: “What is the

probability that a key supplier will fail to supply your operations and what will be the impact?”

Secondly, risk perception will be gathered from the own manufacturing operations: ”what is the

probability and the impact that the company’s operations are interrupted and affects your

shipments?” At last probability and effect can be seen from the distribution side: “What is the

probability and impact that a company’s shipment operations are interrupted affecting their

deliveries?”

3.3 Proactive versus Reactive Risk Strategies

The distinction between proactive and reactive risk management can be approached in relation to

their timeframe. Proactive can be seen from an ex-ante and reactive from an ex-post perspective.

But it emphasizes more than solely this.

What is proactive risk strategy actually? Proactive risk management means that you identify risks and

do something about them before they affect your project or your business operations. This is in fact

the use or the implementation of the risk management framework that was introduced and

37

explained in all its facets in the previous chapter. However, this is easier said than done. Many

managers are reluctant to spend time or money on potential problems, since they have plenty of

other problems already. Proactive management of risks is a style that is often foreign to many

Western managers. Companies fail at risk management in general because they fail at one of the two

fundamentals of managing risk well: cross-functionality on the one hand and being proactive on the

other hand. Companies make the mistake to believe that innovation is only in Research &

Development, and that is where most of the risk lies. A lot of companies lack the cross-functionality

capability between departments nowadays. Companies fail at pro-activeness because they wait until

late in the project when risks start occurring and they let risk management lapse and as a

consequence they perform in a reactive manner. So in concrete by proactive we mean for example a

proactive vulnerability analysis or a proactive mitigation strategy or Proactive risk management of

supply risk must be seen as a competitive advantage for the firm.

And what is reactive risk strategy then? Reactive management is the reverse of proactive

management and is the same as firefighting after a disruption. It means that a company waits until

situations are almost hopeless and then saving them miraculously or takes the needed actions to

counter the risks after the damage is observed. Thereafter the company develops prevention and

contingency plans to make the disruptions less severe in the future if those same disruptions or

failures occur (Wagner & Bode, 2009). “Being reactive is the default position when a risk materializes”

(Dani, 2009). So instead of dealing with risks on a day-to-day basis, responding reactive is in fact

being ready when disruptions occur. Activities such as contingency plans that states corrective

actions to resolve undesirable consequences or the accumulation of knowledge and experience that

can be used when the same problems occur in the future are two example of risk management from

a more reactive approach (Ritchie & Brindley, 2009).

An example of a more reactive approach is the concept of Supply Chain Event Management (SCEM)

(Gaonkar & Viswanadham, 2004). Although this offering doesn’t use a suitable risk framework, it

includes supply chain visibility, track and trace and alert messaging which merely address human

operator problems and leave him as the only person to resolve the issue.

One can consider the distinction between Outcome or Buffer oriented strategies and Behavior based

strategies stated earlier already as an indicator in choosing for a more proactive versus reactive risk

strategy. Because when you do for example supplier development or supplier certification you

proactively manage your risks with your suppliers instead of putting buffers in a reactive manner. The

latter is according to Zsidisin and Ellram (2003) not a manner of risk reduction but is a common

approach for every company. Honda focuses on continuous process improvement of suppliers

38

through evaluation in a lot of areas, certification and development (Nelson et al. 1998). Their

emphasis on process improvement has had enormous results on reducing the probability of supply

risk occurrence. The Honda example supports the finding that improving supplier process is a

proactive way to manage supply risk (Zsidisin & Ellram, 2003).

Also the distinction according to Sheffi and Rice Jr (2005), also early stated the difference between

redundancy and flexibility activities that can be projected to the difference between proactive versus

reactive strategies. While some redundancy is part of every resiliency strategy, it represents purely

cost with limited benefit unless it is needed after a disruption. In that regard adding redundancy can

be more seen of a reactive risk approach. Flexibility on the other hand can be justified for a normal

business approach without even taking into account the benefits of risk mitigation strategies and

cost reduction but results from increasing flexibility are difficult to measure from a cost accounting

perspective.

Wieland and Wallenburg (2012) suggest the distinction of Supply chain management practices in the

following manner. Risk management can be done proactively through supporting the robustness of

the supply chain and reactively on the other hand by supporting the agility of the supply chain.

Robustness was explained above. Agility means “the ability of a supply chain to rapidly respond to

change by adapting its initial stable configuration” (Wieland & Wallenburg, 2012). Instead of being

robust, the initial state is adapted which refers to more reactive strategies whereas robustness refers

more to more proactive because of the status-quo policy measures taken in advance. Resilience

previously explained means then the ability of adaption but with the aim to gain a competitive

advantage after the disruption occurs. This can be seen as the cherry on the cake for a firm that is

able to whatever disruption occurs, it can make a positive consequence for the firm with it.

It was found that being agile has a strong positive effect on the supply chain’s customer value but not

directly on business performance while robustness has a strong positive effect on both the business

performance and Supply Chain’s customer value (Wieland & Wallenburg, 2012). Case studies proved

that robustness is important to handle supplier-side risks while agility is necessary to deal with

customer-side risk and therefore the amount of both performances should fit to the firm’s

competitive strategy.

Jüttner et al. (2003) conducted interviews and noticed that “Still, whilst the drivers are recognized as

competitive pressures with risk implications, it appears that the implications are often sorted out on

an ad hoc basis as organizations go along. What seems to be missing is a more proactive approach

where risk implications are anticipated at an earlier stage.’” The aim in this work is to wonder

39

whether companies are more using proactive risk strategies or industries tend to more respond and

recover from disruptions.

We will investigate the relationship between risk perceptions and risk management. Ellis et al. (2010)

draws a similar relationship in their Theoretical Model of Risky Decision Making but instead focus on

the search of alternative sources as management action. Our focus is on the proactive and reactive

risk management strategies.

3.4 Moderators and Mediators

As moderators for our model we selected two major broader categories that deal with supply chain

management namely practices in supply chain management and supply chain complexity and design.

But in order to describe these categories we first draw some general considerations in advance.

First, not every company is equally enthusiastic in sharing their supply chain management practices

or aligning their practices with their major supply chain partners because of confidentially in the

company or risk that the supplier will gain confidential information and the risk of abuse of

knowledge.

Second, in several countries, regulatory or legal authorities can put constraints on both of these

moderators. They can contain supply chain-relevant (trade and transportation) laws and policies.

This can be an important factor of uncertainty to the setup and operation of supply chains. Several

laws and policies include the ability to obtain approvals necessary for supply chain design activities

and supply chain operation practices (Wagner & Bode, 2009).

3.4.1 Supply chain management practices.

Supply chain management practices are for example sharing information with your suppliers or

forming collaborative approaches with the suppliers. Also the practice of system coupling can be

seen as a management practice for the supply chain. The degree of a firm’s system coupling takes

into account both the intensity and extent to which information about demand, capacity, inventory

and scheduling is shared and used by the firm in both directions of the supply chain (Barut, Faisst &

Kanet, 2002).

These are not necessarily the same as risk management practices but can be part of a proactive or

reactive risk management strategy. As explained above, when managers plan to proactive mitigate

risks, choosing different suppliers or sharing risk information with suppliers, can be part of a risk

management strategy. So, we can say that a condition to perform business will be an effective supply

40

chain and their management. But also performing risk management can be added as an extra value

for the firm.

To achieve the company’s business objectives, firms require effective use of integrative supply chain

management practices. These can include information, knowledge and design integration. On the

one hand sharing information between supply chain partners is needed to jointly control risks (as

seen above). But on the other hand it can decrease competitiveness. There can be a leak of

knowledge and a diminishing control about their inflows and outflows (Narasimhan & Talluri, 2009).

Integration with suppliers but also the internal integration and integration with customers prove to

be important drivers for a company’s performance in case of customer satisfaction & competitive

performance (Zhao, Huo, Sun, & Zhao, 2013).

Furthermore Zhao et al. (2013) found out that supply chain risks are negatively related to supply

chain integration. We will investigate a similar relationship namely the effect the firm’s perception of

risk probability and impact has on the choice of conducting several supply chain management

practices.

In fact we examine whether firms who conduct a lot of supply chain management practices will

choose more for risk management strategies and more proactive or more reactive kind of strategies.

Hypothesis 3a: General SCM practices mediator between environment and risk perception

H3a: the relationship of the strength of the environment and the strength of risk perceptions is

increased by the mediator variable general supply chain management practices.

Hypothesis 3b: General SCM practices mediator between risk perception and the risk management

strategies

H3b: the implementation of general supply chain management practices increases the relationship

between the risk perception indicators and the risk management strategies.

Ellegaard (2008) conduct a study in the German automotive industry and found that companies with

high supply chain performance show a higher degree of supply chain risk management but the

relationship can also be interpreted the other way around. Moreover it found a difference between

companies using preventive risk mitigation instruments contrary to those using reactive instruments.

Using the supply chain vulnerability map based on (Sheffi, 2005) as previously explained, Blos et al.

(2009) identified vulnerable impact rates through the four vulnerability quadrants between

41

automotive and electronic companies in Brazil. The automotive industry’s highest problem is the

complex production forecast but they facilitate it through modular production. Electronic companies

on the other hand are more vulnerable because of the high dependence on the Asian market and the

nature of their products.

In the light of the growing trend to act more environmentally friendly and more focus on the

durability of company performances, we will also look at sustainable practices employed through the

supply chain. For example, managers can perform sustainability performance assessments with their

suppliers or they can train their supplier’s personnel in sustainability issues. Thus we will add the

following hypotheses.

Hypothesis 3c: Sustainable SCM practices mediator between environment and risk perception

H3c: Sustainable SCM practices do change the relationship between environmental factors and the

perceptions of risk.

Hypothesis 3d: Sustainable SCM practices mediator between risk perception and risk management

strategies

H3d: there is an effect on the relationship between risk perceptions and management strategies when

taking the sustainable supply chain management practices into account.

3.4.2 Design and complexity of the supply chain

The complexity of a supply chain is a function of their different levels and tiers in the supply chain.

Tightly coupled supply chains are furthermore of uttermost importance because the chain is

characterized by their components wherefore there are few possible substitutions available.

According to Christopher and Lee, 2001 such tighter coupled supply chains are likely more prone to

disruptions. The traditional approach, first introduced by Porter, is the supply chain in its literal

meaning, namely one supplier delivers parts for your own business and you produce your products

that will be distributed towards or directly delivered to your customer(s) that supports a value-

adding creation towards the whole chain.

Figure 13: Supply Chain

Supplier Manufacturer Distributor Customer

42

Today, this picture seems somewhat too simplified and today’s business activities are more

integrated resulting in a supplier network. Manufacturers appeal on many suppliers and deliver to

more than one customer (see figure below) resulting in the term of supply network management

(SNM).

Figure 14: Supply Network

Furthermore companies perform outsourcing activities when realize that it’s cheaper to produce

some parts or perform administrative activities elsewhere than in-house. If after some period the

knowledge of performing these activities is known and the part production has come down to a fine

art it can be advantageous from a cost perspective to do an in sourcing strategy. Furthermore

companies don’t live alone anymore. Be aware that off shoring activities can increase lead times

(Khan, Christopher, & Burnes, 2009). At last, the creation of joint ventures, alliance partners and

more make the design of supply chain not less easy. Consequently supply chain networks are often

Figure 15: a more complex and adaptive network

43

complex and adaptive but also very dynamic. They are composed of intricate, sometimes

counterintuitive and nonlinear linking elements that include a lot of information and constraints on

each other under which transactions, activities and processes take place (Manuj & Mentzer, 2008).

Although the concept of value network has grown in past years, from a risk perspective managers

should be thinking in terms of networks that create value. Value is transferred from several actors in

a value network. These values which are often not in monetary terms translated can be traded for

other values with other partners. Impact flows constitute the intangible components (information,

knowledge …) shared through partners. Hallikas and Varis (2009) make the comparison with a

business ecosystem theory as a conceptualization, meaning

“The environment beyond the core business & the value network and can be seen as

interdependencies between several business actors and the business environment in which they

operate.”

You should thus determine the dependencies that are most critical to your business and select your

business in your environment that are important enough to make collaborations with in the future.

Several business aspects can be interpreted from a biological view:

Survival from environmental pollution Being head-to-head with technological change

Health of the flora Being able to produce value and share it between members

of the system.

Receive enough air and sunlight A company should position itself in the network where it

can most generate value now and into the future

Ecosystem health regulator Powerful business leaders who create platforms for other

industry players and link other companies

Photosynthesis Business Lifecycle

Dependency from other organisms in

nature

Partnership and complex interplay between competitive

and cooperative business strategy

Table 3: the business from a biological view

44

In figure 16 you find an example of a value network, here for Google. Hallikas and Varis (2009) have

determined the values and impacts with their resulting possible risk through major players in the

Google network. The different players in the network represent nodes where each node represents a

value-adding activity for another node in exchange for some value for the other party. Risk can occur

because partners often transfer unwanted knowledge in close cooperation with each other.

Furthermore the risks in the network are dependent on the behavior of the interconnected systems

of companies. Global supply chains drive up the level of complexity, which drive up the level of risks.

Because of an increasing dynamic complexity and feedback mechanisms these networks have to be

aware of risk and consequently can think of the use of risk management. Giving the importance of

complexity, as you can read a bit further, we also included this facet as a moderator in our network.

It is also important to recognize the indirect relationship because of their increased invisibility these

may pose a higher risk for the head company (Hallikas & Varis, 2009).

The intangible nature of products in the exchanges of the value network increases the complexity of

the supply chain network (Hallikas & Varis, 2009). Less complex supply chains are better able to

manage supply risk and can improve performance. Some complexity reduction measures are

reducing the number of suppliers and serving varied customers through one integrated supply chain

(Hallikas et al., 2004).

Kleindorfer and Saad (2005) addresses the effect of alternative supply chain design options on the

efficiency of the supply chain to various sources of disruption but this research was not yet related to

the use of risk management strategies.

Figure 16: supply information network

45

Relying on a single supply source may be risky nowadays. Think of Ericson who has lost 400 million of

damages from a fire at Philips, its single supplier (Norrman & Jansson, 2004). So Autry and Sanders

(2009) suggests 3 flexible multiple supply source options that are used by the firms to mitigate their

risk. One possibility is to develop multiple suppliers each with a certain advantage for the same

component. For example a company can rely on a flexible supplier that delivers products at any time

for one half and rely for the other part on a cost-efficient supplier. When there is more demand for

any given feature (cost versus delivery) the company can rely on the spot market to make the

difference. Secondly, once a company uses a sourcing strategy then it’s optimal to use partly local

supply sources to supplement their supply base. This can serve as a back-up for the company. At last

it can be optimal to rely on suppliers with multiple manufacturing sites at multiple locations, rather

than just one site so that supply can be easily shifted from one site to another.

Although the majority of authors suggest multiple sourcing against risk, Blome and Henke (2009)

tempt to direct the discussion in favor of single sourcing. The major motivations therefore are the

cost reductions through e.g. standardization and transaction. Second, dependency on one single

supplier doesn’t calculate in higher risk because highly cooperation can provide strategic and

competitive advantage for buyer and supplier. The condition therefore is that they are mutually

dependent on each other because when there is a one-sided dependency from only one party the

relationship becomes more risky. Therefore proactive risk management must also play a role in single

sourcing situations. Finally the decision of the number of suppliers should be made separately from

the choice of supplier relationship, cooperative versus transactional, according to Blome and Henke

(2009). The case of Marks and Spencer has shown that relying on few amounts of close suppliers and

implementing direct sourcing instead of cooperating with a large number of independent suppliers,

they could proactively mitigate and manage their risks to its supply chain in a better way (Khan et al.,

2009). In a later stage they continued to extend their supply base through suppliers that were

engaged throughout the product development process instead of addressing to suppliers who take a

high share of their margins that M&S had in the past.

We will examine the following hypothesizes.

Hypothesis 4: Supply chain complexity and design moderator

H4a: there is a difference in relationship between the environment indicators and risk perceptions

strategies between firms whose amount of complexity and design of the supply chain is higher and

those firms who have a lower amount of supply chain complexity and have a lower level supply chain

design.

46

H4b: there is a significant difference between high-level designed and more complex supply chain or

networks and low-level designed and less complex supply chains for the relationship between risk

perceptions and risk management strategies.

3.4.3 Continental differences

One can consider if there might be differences between continents. There are certainly differences in

the way Asian countries operate their business as compared to European countries. But reflect these

differences also in terms of risk management and risk perception. In a later section we will

investigate for any differences.

Hypothesis 5: Europe versus Asia moderator

H5a: there is a difference in the relationships for environment and risk perception between the

continents Europe and Asia

H5b: there is a significant difference between Europe and Asia for the relationship between risk

perceptions and risk management.

3.4.4 Comparison with 3 years ago

A lot can change in 3 years, certainly in these sometimes turbulent times. Therefore we will analyze if

there are significant differences in the last 3 year as compared to the current implementation.

Hypothesis 6: Current implementation versus effort in the last 3 years moderator

H6a: there is no significant difference between the policy of 3 years ago and the current

implementation for the risk management programs and supply chain management practices that

were related with risk perceptions for both Europe and Asia.

H6b: there is a difference for the supply chain management practices, general and sustainable, and

risk management strategies, proactive and reactive, that were taken 3 years ago and their current

implementation related to the risk perception of the firm for both complex as simple network designs.

47

3.5 Model diagram

Figure 17: Model diagram

An overview of the variables to investigate and their relationships is given above. The general

framework is composed of only the general “blue” variables. In a later stage we will examine the

intervention of the “green” mediator variables, the SCM practices. In the end we explore the “red”

moderator variables.

48

4 Data Collection

Now that the conceptual model is extensively explained, it is time to gather some data. Data is

needed to test and investigate the relationships between the several constructs in the framework. In

the introduction, I will explain the steps and effort needed that has been done to collect data.

Thereafter some exploratory factor analysis will be done to validate the several items that form the

constructs.

4.1 Introduction

To investigate a conceptual framework, there needs to be data and, more preferable, a lot of data.

So to get this data, I have participated with the International Manufacturing Strategy Survey or IMSS.

It is a research project carried out every 4 years by a global network. This project studies production

and supply chain strategies within the manufacturing and assembly industry through a detailed

questionnaire administered simultaneously in many countries by local research groups. In order to

get worldwide data from this research project I’ve collected industry data for Belgium. This was made

possible in cooperation with the Vlerick Business School.

Through telephone contact with several companies I’ve tried to get the goodwill from manufacturing

managers or plant managers to participate with this research project and their commitment to fill in

the detailed questionnaire. The questionnaire used can be found in the appendix. The purpose was

to address manufacturing companies from the metallic, electronic and automobile sector. More

concrete, the following manufacturing industries have been addressed along with their associated

industry codes:

- 25: fabricated metal products, except machinery and equipment

- 26: computer, electronic and optical products

- 27: electrical equipment

- 28: machinery and equipment not elsewhere classified

- 29: motor vehicles, trailers and semi-trailers

- 30: other transport equipment

To find the Belgian companies from the appropriate industries I made use of the Amadeus Export

Data Belgium Database. I also approached the companies who have participated the previous time

for this research project but some companies didn’t exist anymore and other companies had

changed their manufacturing managers compared to the past. To get the company info and the

managers contact information I consult the Trends Top database. Furthermore I provide an online

possibility to fill in the questionnaire through SurveyMonkey so that the managers don’t have to print

49

out the questionnaire format before filling them manually but instead could fill them online

whenever they will and further continue when they have some time.

4.2 Results For Belgium I could approach 30 companies in total from the 6 sectors stated above. There are 136

operations mangers from these companies contacted. 24 of them weren’t eligible for data

incorporation because the company was going to shut down in less than half a year or the company

didn’t fulfill a manufacturing activity or only performs a distribution function. So 30 out of (136 -24 =)

112 managers participated which results in a response rate of about 26, 79%.

There ain’t no such thing as a free lunch. After sending the Belgium questionnaires I get the

worldwide data from the IMSS. In total 19 different countries have participated through this large-

scale research. Table 4.2 gives you an idea of the Industry Code distribution for Belgium and for the

whole world. Table 4.3 gives the participated country distribution.

Figure 18: proportion of participated industries

Figure 19: proportion of participated countries

50

4.3 Variables and constructs

For the construct of environment we include the following variables:

PORTER PEST Market

Competitive rivalry (A2e)

Threat of substitution (A2g)

Bargaining power of suppliers

(A2h)

Bargaining power of customers

(A2i)

Social pressure (A2k)

Rate of technological change

(A2b)

Environmental pressure (A2j)

Demand fluctuation (SC3a)

Market size (A2a)

Market span (A2c)

Market concentration (A2d)

Market entry (A2f)

Table 4: Environmental constructs

The first five variables can be derived directly from the Porters five forces model that we described

before. As regard the PEST analysis we have items about social force, technological force and

environmental pressure. In addition we included some market variables for the respective industries.

Finally we can pick demand fluctuation as additional variables to complete the construct.

As described before, for probability and impact we have surveyed the following variables:

Probability Impact

Probability of a key supplier failure (R1a1)

Probability of operations failure (R1b1)

Probability of shipment failure (R1c1)

Impact of a key supplier failure (R1a2)

Impact of operations failure (R1b2)

Impact of shipment failure (R1c2)

Table 5: Risk perception variables

For the risk action programs, we have earlier made a distinction between more proactive as well as

more reactive strategies. So we made a distinction between these strategies towards the following

mitigation strategies:

Proactive Risk Management Reactive Risk Management

Preventing operations risk (select a more

reliable supplier, use clear safety procedures,

preventive maintenance) (R2a2)

Detecting operations risk (internal or supplier

monitoring, inspection, tracking) (R2b2)

Responding to operations risk (backup

suppliers, extra capacity, alternative

transportation modes) (R2c2)

Recovering from operations risk (task forces,

contingency plans, clear responsibility) (R2d2)

Table 6: Proactive and Reactive Management

When investigating the questionnaire we could pick several supply chain management practices

surveyed. These can be divided in 2 groups namely practices towards general external action

51

programs as well as practices in relation with sustainability management. The former group analyzes

both these practices for a company’s key suppliers and customers. We will include these variables as

a mediator in our model and see if these variables as a whole strengthen the relationship between

Risk Perceptions and the choice of Proactive versus Reactive management.

General external action programs

Information sharing: (about sales forecast, production plans, order tracking and tracing, delivery

status, stock level) (SC6a2 & SC6f2).

Development of collaborative approaches: (supplier development, risk/revenue sharing, long-term

agreements) (SC6b2 & SC6g2).

Joint decision making: (product design/modifications, process design/modifications, quality

improvement and cost control) (SC6c2 & SC6h2).

System coupling: (vendor managed inventory, just-in-time, Kanban, continuous replenishment)

(SC6d2 & SC6i2).

Developing an international sourcing strategy: (supplier scouting at the international level, open

foreign sales office, develop an international purchasing office or distribution network) (SC6e2 &

SC6j2).

In relation with sustainability management

Suppliers’ sustainability performance assessment: through formal evaluation, monitoring and

auditing using established guidelines and procedures (SMh2).

Training or education for suppliers’ personnel (SMi2).

Joint effort with suppliers to improve their sustainability performance (SMj2).

Table 7: Supply Chain Management Practices

For supply chain complexity and design we will include the following variables in table 12. We will

test if there is a difference between higher complex supply chains or networks and less complex

networks towards the adaptation of more proactive risk management strategies. This construct will

be applied as a moderator in our model. We can roughly divide our variables in 2 broader categories

namely role of the plant and variables in relation to the manufacturing network but we will not use

this distinction in our model.

Role of the plant

Producing in one plant versus producing at multiple plants in the network (G2a).

The role of your plant in the network is stable versus the role of your plant in the network is

revised and changed flexibly if needed (G2d).

To what extent is the plant responsible for the supply chain (procurement, logistics, supplier

52

development) (G3b).

The degree of integrated information system in the company wide network (G4c).

Manufacturing network

Improve the use of technology to support communication with other plants of the network (e.g.

ERP integration, shared databases, social networks) (G7d2).

Developing a comprehensive network performance management system (based on cost, quality,

speed, flexibility, innovation, service level) (G7e2)

Change the balance between outsourcing and in-sourcing (PC1b).

Table 8: Supply Chain design and complexity

As a last we will investigate if there is a moderating effect between European countries and more

Asian countries in our model. Next we have grouped items into several groups in the constructs.

4.4 Exploratory factor analysis (EFA)

The measurements of the variables were done by using a 5 point Likert-type scale where 1 means

low and 5 means high. Before moving to our methodology we first have conducted an exploratory

analysis with the use of the Cronbach’s alpha measure of the item factors that completes the

constructs as we can see in Appendix 3.

For environment we have dropped the last variable “demand fluctuations” since when leaving this

one our consistency scale measure increased so in fact the construct will receive a higher alpha when

dropping this variable. The same has happen for the construct of Supply chain complexity and design

where we deleted the variables “the extent of the responsibility of the plant” and “the changing

balance between out-sourcing and in-sourcing”.

53

5 Methodology and Analysis

5.1 General model

Figure 20: General Model

First we will investigate the general model in too deep. The general model is the model without

mediators or moderators and can be seen in figure 20, here above. In a later stage the intervention

of mediators and moderators will come into play.

5.1.1 Confirmatory Factor Analysis (CFA) of the general model

Here we have a reflective measurement scale because the some indicators that form a construct are

correlated and interchangeable. To do a CFA we applied the PLS algorithm with the use of smartPLS.

Explanation of target endogenous variable variance

The indicators Risk probability and Risk impact explains 53.6 % for Proactive risk

management (R² = 0.536) and 52, 4 % for Reactive risk management (R² = 0.524).

The risk perception variables probability and impact are explained for as little as 8.5% and 7.5%

by the environment constructs PORTER, MARKET and PEST.

54

Inner model path coefficient sizes and significance

When looking at the inner model, we can conclude that the effects of Risk impact (0.614 &

0.604) on the both proactive and reactive strategies will be stronger than the effect of risk

probability (0.138 & 0.140) on them.

All of the indicators of risk perception will be statistically significant on the risk management

strategies.

The market variable will as only environment indicator have a statistically significant

relationship towards both perception and impact. The other environment variables PEST and

PORTER have a factor loading of less than 0.1 and we predict that those variables will not be

significant.

Latent Variable Indicators

Outher model

Loadings

Indicator

Reliability

Cronbach's

alpha AVE

Market MarketConcentration 0,7323 0,53626329 0,6552 0,4903

MarketEntry 0,7395 0,54686025

MarketSize 0,6516 0,42458256

MarketSpan 0,6733 0,45333289

PEST EnvirPressure 0,7782 0,60559524 0,6863 0,6006

SocPressure 0,733 0,537289

TechnologicalChange 0,8118 0,65901924

PORTER BargainingPowerCust 0,6644 0,44142736 0,6433 0,4713

BargainingPowerSuppl 0,6421 0,41229241

CompetitiveRivalry 0,6793 0,46144849

ThreatSubstitution 0,755 0,570025

RiskImpact Imp_Operations 0,9783 0,95707089 0,9632 0,9316

Imp_Shipment 0,9604 0,92236816

Imp_Supplier 0,9567 0,91527489

RiskProbability Prob_Operations 0,9776 0,95570176 0,9659 0,9362

Prob_Shipment 0,964 0,929296

Prob_Supplier 0,961 0,923521

ProactiveRiskMgmt Preventing 0,9796 0,95961616 0,9593 0,9609

Detecting 0,9809 0,96216481

ReactiveRiskMgmt Recovering 0,9743 0,94926049 0,9489 0,9513

Responding 0,9764 0,95335696

Table 9: CFA summary table

Indicator reliability

Indicator reliability shows how reliable the items are that forms the constructs per item. To come to

the reliability indicators, we have to quadrate all the outer model loadings. All the indicators show a

reliability that is higher than 0.4 which is the minimum level required for exploratory research.

55

However, a value that is more than 0.7 is preferred. This is the case for the Risk perception constructs

and risk management constructs which show levels that are higher than 0.9.

Internal consistency reliability

The measurement of the alpha in a Cronbach’s alpha analysis calculates the reliability of the

construct as a whole. This analysis is based on the foundation that every item in a scale must

sufficiently be correlated with any other item from the same scale. For this measurement we use the

Cronbach’s alpha measurement indicator. It is recommended for your scale internal consistency that

Cronbach’s alpha should have a value of 0.6 à 0.7 as a lower limit. We see that this is the case.

However we see that this measure is higher with the risk perception and risk management constructs

than those for the environment.

Convergent validity

Convergent validity means when two or more different methods that measure the same concept

correlate high.

To check for convergent validation we have to look for the AVE measure and we have to assure that

this above 0.5. As we look to our latent variables we see that it’s more or less the case. When we

round up the variables MARKET and PORTER, we see that these have a value of 0.5.

Discriminant validity

MARKET PEST

PORTER

Proactive

RiskMgmt

Reactive

RiskMgmt

Risk

Impact

Risk

Probability

MARKET 0,700214

PEST 0,5927 0,7749839

PORTER 0,561 0,5419 0,68651

ProactiveRiskMgmt 0,2867 0,222 0,1657 0,9802551

ReactiveRiskMgmt 0,2926 0,2286 0,1639 0,9588 0,975346

RiskImpact 0,2707 0,1828 0,1814 0,7277 0,7195 0,9652

RiskProbability 0,2908 0,1713 0,1829 0,6439 0,6376 0,8235 0,9675743

Table 10: Discriminant validiy

Discriminant validation means the opposite of convergent validity and exists when two or more

constructs, measured through one or more methods, correlates low and consequently differ

sufficiently from each other.

To check for discriminant validity we must assure that the square root of the AVE value of each latent

variable, in the table showed in bold, must be higher of the correlation of the latent variable with the

other variables. In practice the figure in bold must be higher than the values in the according row and

column. As we check this for all our variables we see that this is the case for all our construct

56

variables. For example the AVE value of Proactive Risk Management is found to be 0.9609 so its

squared root is 0.9803 which is higher than all the values of its row and its column.

Conclusion

To conclude our confirmatory factor analysis we can say the following. The reliability measures

(indicator reliability and Cronbach’s alpha) are both good. For validity measures we say that the

environment variables Market and PORTER are somewhat weak for the AVE measure but the

discriminant validity of the constructs is ok.

5.1.2 Comparison with alternative frameworks

In general, we could have opted to include market entry also in our PORTER construct and include a

possible economic indicator in the PEST construct (for example MarketSize) but this threatens the

discriminant validity. Indeed, Appendix 5 shows that the discriminant validity is threatened. This is

because the same item is used for more than one construct. Furthermore the AVE variable is bad for

the PORTER construct. At last several indicator reliabilities are also less than 0.4 which is too low.

What reliability and validity should we have if we put all the environmental factors together in one

construct? Appendix 5 provides some figures. A lot of environmental reliability indicators are less

than 0.4 and even less than 0.3 but the Cronbach’s alpha for environment is actually good in

concerning the reliability indicators. For the validity indicator the same conclusion can be made.

Although the AVE is very weak (0.3648) the discriminant validity scores are better, especially for

environment. So according this concept, we’re stuck in between: 1 of 2 indicators of reliability and

validity performs well but the other bad.

The follow figure demonstrates the confirmatory analysis for several constructs. At the bottom we

added 3 other frameworks as well. We can conclude that our general will be the most fitted.

57

indicator

reliability

internal

consistency

reliability

convergent

validity

discriminant

validity

general model Good Good Neutral Good

market entry in PORTER and

market size in PEST and included in

market

Bad Good Bad Bad

all environmental factors Bad Good Bad Good

market entry in PORTER and

market size in PEST but excluded

from MARKET

Bad Bad Bad Good

market entry in PORTER and

market size in MARKET but the

latter excluded from PEST

Bad Good Bad Bad

market size in PEST and market

entry in MARKET but the latter

excluded from PORTER

Good Neutral Neutral Good

Table 11: CFA summary table for comparison with other frameworks

5.1.3 Descriptive statistics

Rivalry among competitors is seen for most firms as relatively high whereas the threat of substitution

is seen as much lower. Furthermore customer bargaining power is much higher than the bargaining

power of suppliers which in fact stress the distributor or customer as an important player.

From the 3 environmental construct, it appears that Market variables are perceived as the most

influenced ones to the firm. The other environmental construct variables are jointly a little less

important but still above a neutral perception of 3. For the entire world, it seems that the threat of a

key supplier failure is the highest possible (2.74) and the risk of shipment operations are the lowest

(2.32). As for probability, the same conclusions can be made for impact. But what is more important

is that the impacts for the three categories are much higher. It means that companies deal with

medium probability risks (+/-2.5) and higher impact (+/-3.5).

It seems that most firms see their risks with a lower probability but with higher impact. It appears

that risk management has increased since 3 years for the four indicators. Preventing has the highest

score and recovering the lowest both for current implementation and 3 years ago.

58

5.1.4 Hypothesis testing

Now we will start to do so hypothesis testing and thus check the structural path significance.

Outer model

T Statistics

BargainingPowerCust <- PORTER 2,9481

BargainingPowerSuppl <- PORTER 3,6311

CompetitiveRivalry <- PORTER 3,5914

ThreatSubstitution <- PORTER 4,4393

MarketConcentration <- Market 10,3393

MarketEntry <- Market 10,1612

MarketSize <- Market 4,9895

MarketSpan <- Market 6,8934

EnvirPressure <- PEST 4,4864

SocPressure <- PEST 4,2431

TechnologicalChange <- PEST 5,1977

Imp_Operations <- RiskImpact 261,8998

Imp_Shipment <- RiskImpact 100,6175

Imp_Supplier <- RiskImpact 91,4657

Prob_Operations <- RiskProbability 254,047

Prob_Shipment <- RiskProbability 101,3114

Prob_Supplier <- RiskProbability 104,3062

Recovering <- ReactiveRiskMgmt 130,6781

Responding <- ReactiveRiskMgmt 157,9065

Detecting <- ProactiveRiskMgmt 149,0042

Preventing <- ProactiveRiskMgmt 180,756

Table 12: outer model T-statistics

All of the T-statistics are larger than 1.96 so we can conclude that the outer model loadings are highly

significant.

Inner model

Sample Mean (M) Standard Error (STERR) T Statistics

Market -> RiskImpact 0,2371 0,0629 3,7657

Market -> RiskProbability 0,2763 0,066 4,2393

PEST -> RiskImpact 0,0227 0,0444 0,5158

PEST -> RiskProbability -0,0102 0,0441 0,2755

PORTER -> RiskImpact 0,0417 0,0489 0,7381

PORTER -> RiskProbability 0,0401 0,0482 0,6756

RiskImpact -> ProactiveRiskMgmt 0,6023 0,0843 7,2829

RiskImpact -> ReactiveRiskMgmt 0,593 0,0846 7,146

RiskProbability -> ProactiveRiskMgmt 0,1464 0,0699 1,9812

RiskProbability -> ReactiveRiskMgmt 0,1477 0,0709 1,9755

Table 13: inner model loadings and T-statistics

59

Market variables are significant with a significance level of 5%. The other environmental variables do

not have an effect on the perception of impact as well as probability. This supports Hypothesis 1 for

market variables but not for PORTER and PEST variables. Risk impact perception is strongly significant

on the 5% significance level towards risk management strategies. On the other hand, risk probability

is just not significant on the 5% significance level but certainly on the 10 % significance level. This

supports the hypothesis 2a for risk impact on both risk management strategies but not really

supports the 2b hypothesis.

5.1.5 Multicollinearity

Multicollinearity in fact occurs when two predictor variables are highly correlated. The threat of this

phenomenon is that coefficient estimates can change drastically in response to small changes in the

data. To test the multicollinearity, statisticians often apply the tolerance or Variance Inflation Factor

(VIF) values. The tolerance factor must be higher than 0.2 and the corresponding VIF factor higher

lower than 5. We see that this is the case for all of our constructs.

Coefficientsa

Model

Unstandardized

Coefficients

Standardized

Coefficients

t Sig.

Collinearity Statistics

B

Std.

Error Beta Tolerance VIF

1 (Constant) -7,45E-06 0,023 0 1

Market 0,072 0,041 0,072 1,755 0,08 0,322 3,104

PEST 0,071 0,033 0,071 2,129 0,034 0,487 2,055

PORTER -0,048 0,034 -0,048 -1,389 0,165 0,459 2,181

RiskImpact 0,603 0,041 0,603 14,659 0 0,32 3,122

RiskProbability 0,123 0,041 0,123 2,966 0,003 0,317 3,159

Table 14: Multicollinearity

60

5.2 Input from mediator variables

5.2.1 Framework

Figure 21: framework with general SCM mediator between environment and risk perception (first framework)

In the following section we will analyze the effect of supply chain management practices, both the

general ones and also the efforts towards more sustainability. Because the degree of supply chain

management practices might enforce the relationship between environmental factors and risk

perception but might also strengthen the relationship on this perceptions towards risk management

strategies, we will investigate both mediating effects. The framework where general SCM practices

are mediated between environment and risk perception is given in figure 21. The framework for the

general SCM practices mediated between risk probability/impact and proactive/reactive risk

management is given in figure 22.

61

Figure 22: Framework with general SCM mediator between risk perception and risk management (second framework)

We see that explanation of target endogenous variable variance is increased both for proactive and

risk management when we introduced this mediator to additionally explain the endogenous variable.

Secondly, the inner factor loadings for the relationship between risk probability and both

management strategies have declined below 0.1. We might expect that this relationship will be gone.

In appendix 4 we found both frameworks but instead with the interplay of sustainable SCM practices.

The R² of this framework has slightly augmented to 55.1 % for proactive risk management and 54.2 %

for reactive risk management when considering sustainable practices between risk perceptions and

management.

5.2.2 Confirmatory factor analysis

If we take a look at appendix 6, we found suitable indicators for all of the factors of the mediators.

The determination coefficient R² has increased from 53.6 % and 52.4% to 61.7 % and 60.9% for

proactive and respectively reactive management. We see that for the general SCM there are very

high scores for Cronbach’s alpha and for the AVE measure. Moreover, the indicator discriminates

good with the other constructs. The same can be said for the sustainable SCM.

5.2.3 Descriptive statistics with mediator variables

General supply chain management practices

Also for supply chain management practices we see that all the indicators have increased from 3

years ago. Yet we see a different ranking from all the practices. What is striking is that Supplier

62

collaboration and sharing information with the supplier scores 2 times as the highest. It seems that

firms highlight the importance of sharing information above performing joint actions.

Sustainable supply chain management practices

When we analyzed the descriptive statistics we see that managers performs on average more on

performance assessment with the suppliers and the least on joint efforts with the suppliers with the

aim for more sustainability. What we see is that on average these numbers are somewhat lower than

the general SCM practices. To compare with 3 years ago all these indicators have increased.

5.2.4 Structural path significance

Because we in advance consider SCM practices might mediate both the environment – risk

perception relationship as well as risk perception – risk management relationship, we investigated

both frameworks. Appendix 6 shows the T-statistics for the inner loadings for the first framework.

We consider both the general SCM as well as the sustainable SCM. The outer loadings were all

significant and are not retaken here. No differences occur between general and sustainable SCM.

PORTER variables stay not significant and all market variables stay significant. In addition PEST

variables seem to have now a significant relationship with SCM practices for both mediators and a

significant relationship with probability for the sustainable SCM mediator. What is striking is whereas

risk probability towards risk management was here above yet significant on the 5 % level for the

general model we see that this relationship has been softened.

Also for the second framework we can draw some pretty similar conclusions. The outer loadings are

once again not retaken but they are all significant. We see that the relationship between risk

perceptions and SCM practices as well as their relationship with risk management strategies are all

significant. What is more remarkable here is that the significance of the relationship between risk

impact and SCM practices differ from general and sustainable SCM practices. It seems like the

mediator has some effect on the relationship between these two variables. But can we talk of a

mediating effect between our constructs?

5.2.5 Mediating effect and hypothesis testing

To test for the mediating effect we can make use of the Sobel test. It tests whether a variable

mediates the significant relationship between 2 other variables. To test for this phenomenon we

apply his following formula:

Formula 1: Sobel test statistic

63

It’s a test statistic that decides whether the variables significant mediates i.e. strengthen or soften

the relationship between 2 other variables. Therefore we need some indicators. First we need for the

2 indicators the β’s from the 2 independent relationships, namely a and b, and their standard errors,

SE_a and SE_b.

For example, if we want to calculate the Sobel test statistic for the general SCM mediator between

Market and risk probability for the first framework we must compute their β’s and standard errors.

We find this numbers in appendix 7. For a = 0.1848, b =0.4971, SE_a = 0.0599 and SE_b =0.057 we

found a Test statistic z = 2.9085 which is significant on the 5% significance level and therefore there is

a mediating effect for this relationship and the mediator decreases the dependency from 0.28 to

0.187.

So we will now examine if the 3th hypothesis is fulfilled. If we look at appendix 7, we can draw

conclusions for both mediators for the first framework. Except for the relationships with the PORTER

variables, the mediating effect is significant for the environmental variables on risk perceptions. The

market variable is partial mediated because this relationship remains significant. With regard to the

PEST variable, the choice of SCM practice is not really clear: The relationship is partial mediated for

the general SCM mediator but not for the sustainable SCM mediator. Risk probability might be fully

mediated by sustainable SCM practices in relation with the PEST variables. This can be seen as follow:

managers perceives the environmental factors (e.g. technological change, social pressure,

environmental pressure) and act with its suppliers in a sustainable manner with in turn can adjust

their probability of risk but apparently not for the impacts of risk.

What about the second framework, we can conclude the following: There is a difference between

the effects of the mediating factors on the variables. In fact, when we only consider the 3 sustainable

SCM variables, the relationship between risk impact and risk management is not mediated. Second,

the relationships are all weakened with the interplay of the mediators except for the impact of risk

on pro- and reactive risk management. Apparently managers take their degree of general supply

chain management practices into account when performing a particular level of strategy.

Figure 23: Mediating effect

64

5.3 Input from moderator variables

5.3.1 Descriptive statistics and differences for the moderator variables

Europe and Asia

Figure 24: Environmental factors between Europe and Asia

Figure 24 shows the difference between European and Asian countries regarding the environmental

factors. What we clearly see, is that a lot of environmental factors are perceived as stronger by Asian

countries except for customer and perception power. If we look at appendix 8 for paired sample t-

statistics, we find more or less the same conclusions. All the environmental variables are significantly

different between the continents, except for customer power, which is perceived as lower for Asia,

and market entry, which is not perceived as lower for Asia.

3,36

3,33

3,46

3,49

3,86

3,00

2,94

3,11

3,71

3,33

3,24

2,68

3,69

3,62

3,65

3,81

3,90

3,16

3,00

3,23

3,60

3,50

3,36

2,58

3,19

3,20

3,32

3,30

3,83

2,89

2,89

3,02

3,79

3,24

3,16

2,67

market size

techn. Change

market span

market concentration

competitive rivalry

market entry

threat of substitution

supplier power

customer power

env. Pressure

social pressure

demand fluctuation

0,00 0,50 1,00 1,50 2,00 2,50 3,00 3,50 4,00 4,50

Europe

Asia

Whole World

65

Figure 25: Risk Probability and Impact for Europe and Asia

Here we see that Asia perceives more risk probability than the European companies but instead

weight the impact as much stronger than certainly for supplier disruptions. In a later stage we will

investigate if this risk perception difference will also have a different relationship towards risk

management strategies. For risk probability the indicators are significantly different but for risk

impact this counts only for the perception of impact from a supplier default (Appendix 8).

Increase / Decrease Risk action programs in the last 3 years (2010 – 2013)

Preventing

Risk

Detecting

Risk

Responding

Risk

Recovering

Risk

Whole World + 3,02% + 5,84% + 6,09% + 6,66%

Asia + 11,36% + 15,06% + 12,75% + 14,63%

Europe - 2,67% + 0,13% + 1,48% + 1,41%

Table 15: Risk management for Europe and Asia

Table 15 gives you an idea of the risk management development programs in the last 3 years (from

2010 – 2013). As we can see Asian countries have developed or done more effort the past 3 years in

risk action programs despite their already high level in 2010. Europe on the other hand shows a

minor increase for detecting and reactive risk management and even a higher decrease for

preventing risk. Seems like those countries believe that risk management programs are less fruitful

for their operations or they feel themselves in less crisis situations than 3 years ago. Appendix 8

proves that for all the risk management indicators there are significant differences. The highest

difference is for responding to risks.

At last, for the mediator variables general and sustainable SCM practices, we found in appendix 8

that all the indicators are clearly different. These practices seems to be more implemented by Asian

countries. In particular joint decision making with their customers is more performed for Asian

66

countries. What is more appealing is that Asian countries do more effort for sustainable practices, in

particular for again joint efforts and also supplier education on durable issues.

The same accounts for Supply chain design and complexity. Only integrated information systems

seems to have no significant difference between countries.

Low versus high complex supply chain designs

When we look at appendix 8, we find that nearly all environmental variables are perceived as higher

for more complex networks except for customers bargaining power but seems not to be significantly

different. Threat substitution is neither significant on the 5% level but appears to be a little higher

for more complex networks.

Different means occur for all the probability of risk indicators for the complexity moderator. However,

it seems that their risk perception of impact differ not so meaningful. Only the risk of shipment

disruptions is perceived stronger by higher complex networks.

Increase / Decrease Risk action programs in the last 3 years (2010-2013)

Preventing

Risk

Detecting

Risk

Responding

Risk

Recovering

Risk

Low SC complexity -0,51% 1,87% 1,67% 5,58%

High SC complexity 2,18% 5,74% 5,90% 7,52%

Table 16: Risk management for lower and higher complex networks

Furthermore, what about the risk action programs, we see that more complex networks implement

more risk action programs than 3 years before. But is this relationship statistically significant

different between lower and higher supply chain complexity? If we look at Appendix 8, we can

conclude that it certainly is.

At last, also general and sustainable SCM practices does in fact differ from their degree of complexity

of their supply chains. System coupling appears to have the greatest difference between the two

categories. Indeed, lower designed and complex networks don’t always have the availability of loose

coupling. Also training for the sustainable SCM is perceived as the greatest difference between the

two groups. The lowest difference is for collaborative approaches. It can be seen for firms with a less

developed supply chain as another, often cheaper way, to integrate their supply chain.

67

A note for the validity of the Supply chain design and complexity construct and the

determination coefficients for the frameworks according to the moderator variables

To give an idea of the validity of the construct, appendix 6 provides some figures for the factor

analysis. As we can see the indicators satisfied their threshold values and besides discriminates well

from the other indicators

If we take a look at table 17, we discover that the variability in the model explained by the R² is

increased with 5 to 6 % when we only consider European countries. When only modeling Asian

countries, the explained variance decreases with7% for proactive risk management but only 3 % for

reactive risk management.

Proactive Reactive

Asia 54,50% 58,10%

Europe 67,30% 66,10%

Low SD&C 34,30% 35,90%

High SD&C 6,30% 5,60%

Table 17: determination coefficients

When considering for the degree of SCD&C, the determination coefficient has drastically decreased.

A possible reason for this trend might be the decreased amount for data for this figures. Several data

points lack some values for indicators that describes the SC complexity construct. The aim is to

investigate this construct rather as a moderator and for the purpose to investigate differences then

nearly explain the whole model with these data only.

5.3.2 Moderating effect and moderated mediation

Explication for the difference calculation

We will test for some moderating variables, which mean if relationships are in fact moderated or

different between 2 groups. This is called multi-group moderation and we can see the T-statistics in

appendix 8. First our dataset were split into Asian countries and European countries. It seems that

for the former group we have 317 observations and for the latter 503.

68

Asia Europe

(m-1)^2 99856

Sample Size 317 503 (m+n-2) 818

Sample Mean -0,0215 0,1802 (n-1)^2 252004

Standard Error (S.E.) 0,0821 0,0787 sqrt(1/m+1/n) 0,071712

t-statistic 1,7020 1st half denominator 0,822824

p-value (2-tailed) 0,0891 2nd half denominator 1,908111

sqrt(1st half + 2nd half) 1,652554

Full denominator 0,118508

numerator 0,2017

Figure 26: calculation for the multi-group moderation t-statistic and p-value

Formula 2: t-test for multi-group moderation and moderated mediation

If we want to calculate for example the significant T-statistic for differences between Europe and Asia

for the relationship between the probability of risk and proactive risk management we must use the

sample means and standard errors. These can be found in SmartPLS after bootstrapping. To calculate

the t-statistic we must fill in the formula given above. Therefore it is easy to split the calculations a

bit like as done above.

For the moderator supply chain design and complexity the dataset is again split in two. The first

group consists of the observations which have an average of the 5 indicators that forms this

construct of less than 3. The second group those that are more or equal than 3. The choice of a

threshold of 3 was decided because the earlier threshold of 2.5 generates less than 100 observations

for the first group. In order to conduct these paired t-tests with some validity, we opt to choose for

groups for at least 100 observations. So these t-statistics are calculated in the same way.

We can also determine the moderating effect through relationships with mediators or otherwise

called the moderated mediation. These can be seen as the total effects between variables. The

69

separate effects which are included under multi-group moderation are not influenced by the SCM

practices mediator. The total effects which were the same as their separate effects were not retaken

in the moderated mediation table. In the next two sections we will try to see if we can support

hypothesis 5 and hypothesis 6.

General SCM mediator

Risk probability – risk management difference between Europe and Asia

There is a significant difference between Europe and Asia in the relationship between Risk Probability

and Risk management strategies on the 10% significance level.

Europe has a significant relationship between them and Asia totally not. The difference between Asia

and Europe is more significant for reactive (1.869) than for proactive risk management strategies

(1.702).

Risk Probability –risk management & SCM for lower and higher complex supply chain networks

There is a significant difference between high-level complex supply chains and low-level supply

chains in the relationship between risk probability and risk management strategies as well as supply

chain management practices on the 10% significance level.

Lower level complex supply chains have a stronger relationship for the probability of risk towards

both proactive as well as reactive risk management than higher-level complex networks. The

difference between Low and High complex networks is more significant for proactive (1.812) than for

reactive (1.702) risk management.

The relationship between risk probability and supply chain management practices is significant for

high-level supply chains but not for low level supply chains and the difference is also significant.

Sustainable SCM mediator

SCM – risk impact between lower and higher complex networks in the first framework

What is surprising when we analyze the T-statistics is that for the first framework only the

sustainable supply chain management practices are different moderated towards risk impact. It

seems that lower complex networks have a significant relationship for their sustainable SCM

practices towards their perception of their impact of risk.

70

Risk probability and SCM practices – risk management for lower and higher complex networks

in the second framework

Secondly when analyzing the t-statistics for moderators we see that distinction between risk

probability and risk management, both proactive and reactive, goes also for sustainable variables.

Furthermore, and this is new, for the sustainable moderator it appears that also the sustainable

practices are different between these groups for the relation towards risk management. But in this

case it are the high complex networks that shows a significant relationship between these practices

and both proactive and reactive management.

Risk impact – SCM practices for lower and more complex networks in the second framework

Last but not least, we found one moderated relationship on the 5 % significance level, namely the

relationship from the risk impact towards sustainable practices. Lower complex systems take in mind

on their perception of risk impact to choose the degree of sustainable practices.

Mean Values, standard errors and T-statistics for the two groups for multi-group moderation

first framework < sustainable SCM Low complexity High complexity

SCMpractices -> RiskImpact -0,1185 0,0538 2,0577 0,0138 0,0466 0,451

second framework < general SCM Asia Europe

RiskProbability -> ProactiveRiskMgmt -0,0215 0,0821 0,3400 0,1802 0,0787 2,136

RiskProbability -> ReactiveRiskMgmt -0,0402 0,0854 0,5207 0,1877 0,0806 2,1759

second framework < general SCM Low complexity High complexity

RiskProbability -> ProactiveRiskMgmt 0,3734 0,1654 2,5179 0,0449 0,098 0,5057

RiskProbability -> ReactiveRiskMgmt 0,3654 0,1608 2,5375 0,057 0,0997 0,6483

RiskProbability -> SCMpractices -0,0927 0,144 0,8437 0,265 0,1278 1,9934

second framework < sustainable SCM Low complexity High complexity

RiskImpact -> SCMpractices -0,3231 0,1505 2,2591 -0,0271 0,0725 0,2424

RiskProbability -> ProactiveRiskMgmt 0,3621 0,1671 2,3725 0,0626 0,0824 0,8433

RiskProbability -> ReactiveRiskMgmt 0,3397 0,1633 2,2728 0,0614 0,0855 0,7836

SCMpractices -> ProactiveRiskMgmt -0,0156 0,0708 0,3214 0,2079 0,0724 2,6722

SCMpractices -> ReactiveRiskMgmt 0,0345 0,064 0,3724 0,1723 0,0467 3,4437

Table 18: Mean, standard errors and T-statistics for the two groups for moderation

Conclusion

Despite that there is not so much found on the 5% significance level, we can make some conclusions.

What about sustainable practices, it seems like there are no differences between Europe and Asia.

Furthermore it is surprising but the differences between complex networks for sustainable SCM

practices and risk impacts are associated with each other in both directions. But both moderated

relationships are not equally significant. Apparently low complex networks focus significantly more

on sustainable SCM practices to perceive the impact of risk than general SCM practices.

71

Furthermore it appears that lower complex networks more account for their perception of risk

possibility to perform their amount of risk management whereas high complex networks not. Also

European countries do this strategy and Asia not.

What is surprising is that the higher complex supply chains act on their general supply chain

management practices in relation to their probability of risk and not at all in the relation towards risk

management. It shows that more complex networks do in fact care about their supply chain. Once

they perceive a higher risk probability they align their supply chain management practices in the

same way. This is not the conclusion for a less complex supply chains.

A last remark that we can make is that for sustainable practices, more high complex supply networks

focus on their SCM practices whereas low complex supply networks focus more on their risk

probability towards both proactive and reactive risk management.

5.4 Some comparison with 3 years ago

A limitation of this study and this gathered data is the absence of data for “effort in last 3 years” for

some variables i.e. for environment, risk probability, risk impact and some supply chain design &

complexity variables. We will now consider to make some conclusions for the last hypothesis (H6).

In earlier section we have showed that there were progressions in risk management compared to 3

years ago. We will now execute some paired sample t-test in order to proof these progressions but

also take a look at evolutions of general and sustainable SCM practices.

As we look through appendix 9 section paired sample t-test for variables, we found evidence for

evolution of most of the variables. What about the dataset for Asia, we see that all the indicators

have increased in value between 3 years ago and now. For European countries the story is somewhat

different. Although these companies have increased on average their reactive risk management

programs, proactive risk management has not significantly changed in the past 3 years. Preventing

has decreased and detecting increased some but not much. Furthermore some SCM practices proved

to be not significant more practice in the past 3 year. This is the case for performance assessment for

the company’s sustainability practices with their suppliers (SusPerfAssS is not significant on the 5 %

significance level). In addition, only sharing information with the suppliers as well as with customers

has increased between the past 3 years for European companies. Other general SCM practices

proved not to be significant on the 5 % significance level. At least, when we conclude for the whole

world, we can say that all indicators have significantly changed except for developing an internal

sourcing strategy with suppliers.

72

There seems to be no significant relationship between current implementation and effort in the last

3 years for all the investigated relationships. To come to this table we applied the same formula as

for calculating moderator t-statistics. The highest t-statistic is for the relationship between SCM

sustainable practices on reactive risk management for the first framework with low complex

networks. Apparently, no significantly different relationships exist between now and 3 years ago. We

will now summarize or findings of the proposed hypothesis.

5.5 Hypothesis summary

Hypothesis summary

H1 Accepted for market, Rejected for PORTER and PEST for both risk perceptions

H2a Accepted for both risk management strategies

H2b Accepted for both risk management strategies

H3a Accepted for market and PEST Rejected for PORTER for both risk perceptions

H3b Accepted for both risk perceptions on both risk management strategies

H3c Accepted for market and PEST Rejected for PORTER for both risk perceptions

H3d Accepted for risk probability on both risk management strategies Rejected for risk impact on both risk management strategies

H4a Accepted for the multi-group moderation relationship between sustainable SCM practices and risk impact * Rejected for all other multi-group relationships Rejected for all moderated mediation relationships

H4b Accepted for the multi-group moderation relationships between risk probability on both risk management strategies where both SCM practices are mediator * Accepted for the multi-group moderation relationship between sustainable SCM practices and both risk management strategies * Accepted for the multi-group moderation relationship between risk impact and sustainable SCM practices Rejected for all other multi-group relationships Rejected for all moderated mediation relationships

H5a Rejected for all multi-group relationships Rejected for all moderated mediation relationships

H5b Accepted for the relationship between risk probability on both risk management strategies where general SCM practices is mediator * Rejected for all other multi-group relationships Rejected for all moderated mediation relationships

H6a Rejected for both frameworks and both SCM practices

H6b Rejected for both frameworks and both SCM practices Table 19: hypothesis summary table

Table 19 summarizes the proposed hypotheses from our conceptual framework and their results.

‘Accepting’ denotes here that the test was significant and consequently supports our conceptual

framework. The Hypothesis’s noted with a * are the those ones who are significant on the 10%

significance level.

73

6 Overall Conclusion

“Many companies perceive if they have to choose their effort between costly risk mitigation strategies

or more flexible supply chain strategies as if they to choose one of both.”

We began this work with declaring several concepts like risks, their aspects and drivers, disruptions,

vulnerability and many more. We proposed the framework to implement a comprehensive risk

management on the basis of many previous literature researches. Thereby we addressed the fact of

risk monitoring and sharing risk information. The concept of SCRM has been linked with SCM, SCSM

and ERM.

The aim of this work was to investigate the difference between the use of more pro-active and more

re-active risk management strategies to manage supply chains against disruptions. A conceptual

framework has been presented which includes environmental factors, SCM factors, risk factors and

SC Design and Complexity variables.

Data was gathered with the aim to test our framework and propose several hypotheses. We have

aimed to compose the most reliable model and with the highest validity. Two frameworks have been

investigated where both mediator variables were between the constructs of environment and risk

perception on the one hand and between risk perception and management on the other hand.

Some environmental variables (i.e. market variables) have impact on the perceptions of risks

(hypothesis 1). Secondly, we saw a stronger influence of risk impact than risk probability on risk

management strategies and most firms perceives a medium risk probability with a higher impact on

average. Although risk management has increased by several countries in 3 years, we do not find so

much difference for more proactive or reactive risk management implementation. Yet, proactive

management is slightly more in favor (hypothesis 2) but not always related with other variables.

General SCM practices ameliorate the model a lot, in terms of declared variance. Sustainable SCM

slightly improves the model. Apparently managers take their degree of general supply chain

management practices into account when performing a particular level of strategy (hypothesis 3).

When we analyzed for Europe & Asia and Low versus High SCD&C (hypothesis 4) we found a lot of

differences in their environmental and risk perceptions but also in their general and sustainable

supply chain and risk management. In fact, Asian countries score a lot higher for nearly all the

indicators. Even worse, the practice of preventing risks more proactively has declined for European

countries. Asian countries perceive their probabilities of risk as much higher and yet their impact as a

lot lower than European countries. Nevertheless these Asian countries implement more risk

74

programs. They are able to compare a highly leveled supply chain with an advanced level of risk

management in comparison with European countries. This is the challenge in today’s business

operations.

When we dig a little deeper, i.e. performed some further analyses in differences between

moderators in the several relationships from our conceptual framework, the outcomes are not

always explicable. Risk impact might be associated with sustainable SCM practices in both directions

and the perception of risk probability differs to their level of risk management implementation.

Lower complex SC focus more on cheaper forms of SCM practices like information sharing and

collaborative approaches whereas more advanced supply chains focus on joint decision making and

system coupling. In addition, lower complex supply chains focus more on risk perception in their

relation to risk management implementations. Complex networks do in fact care about their supply

chain because their risk management practices are more dependent of these. Once they perceive a

higher risk probability they align their supply chain management practices in the same way. This is

not the conclusion for a less complex supply chains (hypothesis 5). At least, a lot of variables have

increase in 3 years but not significant different relationships were found.

Why can it be possible that a lot of risk management efforts don’t really break through or not much

changed in their level of implementation in a lot of companies? Perceive these companies as if the

economic crisis is gone for some time? And what about preventing natural hazards?

First, we must say that a lot of companies see that risk management strategies are not always time

and cost-effective. Certainly European countries think that risk management doesn’t always prove to

have added value. Secondly, some strategies might reduce flexibility of operations or supply chain

management strategies because they could impose business restrictions. Finally, the feeling of many

managers that the crises is yet behind our backs may arouse that we must not stick to constantly

prevent risks or performing business operations in a cautious way.

Besides, a lot of papers in the risk management were written during or after the crisis (i.e. 2008-

2010). One of them is the German research from paper 37. They found that the financial crisis has

not influenced the relationship between enterprise risk management and supply chain (risk)

management. We found overall relationship between supply chain management practices and

proactive risk management for both current implementations as well as for the effort in the last 3

years for the whole world but with no significant differences. This indicates that after the crisis,

companies stick to align supply chain practices and risk strategies but not everyone augment them.

75

7 Limitations and possibilities for future research

In this work we investigated risk management strategies and divided them in more reactive and

more proactive ones. But more risk management practices might upgrade the framework in value.

Because, what we have noticed, is that the constructs for proactive and those for reactive action

programs don’t discriminate too much. This makes generality of findings more difficult. In future

research it might be interesting to further investigate related risk program strategies such the

practice of an integrated risk management or the usage of a supply chain or catastrophic

vulnerability framework.

Second point we like to address is that besides a lot of data that is used for the current

implementation, more data for 3 years ago would be fruitful to make more conclusions for the

evolutions of more indicators (risk probability, risk impact, environment factors and some supply

chain design and complexity variables).

In addition future research can be executed for the relationship of more risk indicators. Besides the

risk perceptions of risk probability and risk impact, other risk indicators like for example speed of risk,

risk frequency, probability of detecting and the perception of overall risk can be further investigated

towards risk management.

Conclusions have been made for the whole world an some differences for the European and Asia

countries. The dataset used contains 14 European countries, good for 503 companies and 4 Asian

countries that represent 337 companies. But this dataset does lack some world figures namely only

Canada from North America has participated for this research. So other world continents were not

represented through this data. Further research can research data for the missing countries here.

At last, no statements have been made for the Belgian firms. Although a modest range of 30

companies have participated through this research, several indicators didn’t contain 30 values. It

was therefore not recommended to execute statistical analysis. Future research could enlarge the

Belgian dataset.

76

8 References

Altay, N., & Ramirez, A. (2010). Impact of disasters on firms in different sectors: implications for

supply chains. Journal of Supply Chain Management, 46(4), 59-80.

Alvarenga, C., & Lehman, E. (2012). Accenture: Managing Risks in the Supply Chain: Reaching New

Standards (pp. 1-12): Accenture.

Asbjørnslett, B. E. (2009). Assessing the vulnerability of supply chains. In R. Ritchie & G. Zsidisin (Eds.),

Supply Chain Risk (pp. 15-33): Springer.

Autry, C., & Sanders, N. (2009). Supply chain security: A dynamic capabilities approach. In R. Ritchie &

G. Zsidisin (Eds.), Supply Chain Risk (pp. 307-329): Springer.

Blome, C., & Henke, M. (2009). Single Versus Multiple Sourcing: A Supply Risk Management

Perspective. In R. Ritchie & G. Zsidisin (Eds.), Supply Chain Risk (pp. 125-135): Springer.

Blome, C., & Schoenherr, T. (2011). Supply chain risk management in financial crises—A multiple

case-study approach. International Journal of Production Economics, 134(1), 43-57.

Blos, M. F., Quaddus, M., Wee, H., & Watanabe, K. (2009). Supply chain risk management (SCRM): a

case study on the automotive and electronic industries in Brazil. Supply Chain Management:

An International Journal, 14(4), 247-252.

Cagliano, A. C., De Marco, A., Grimaldi, S., & Rafele, C. (2012). An integrated approach to supply chain

risk analysis. Journal of Risk Research, 15(7), 817-840.

Celly, K. S., & Frazier, G. L. (1996). Outcome-based and behavior-based coordination efforts in

channel relationships. Journal of marketing research, 33(2), 200-210.

Chen, F. Y., & Yano, C. A. (2010). Improving supply chain performance and managing risk under

weather-related demand uncertainty. Management Science, 56(8), 1380-1397.

Dani, S. (2009). Predicting and managing supply chain risks. In R. Ritchie & G. Zsidisin (Eds.), Supply

Chain Risk (pp. 53-66): Springer.

Ellegaard, C. (2008). Supply risk management in a small company perspective. Supply Chain

Management: An International Journal, 13(6), 425-434.

Ellis, S. C., Henry, R. M., & Shockley, J. (2010). Buyer perceptions of supply disruption risk: a

behavioral view and empirical assessment. Journal of Operations Management, 28(1), 34-46.

Gaonkar, R., & Viswanadham, N. (2004). A conceptual and analytical framework for the management

of risk in supply chains. Paper presented at the Robotics and Automation, 2004. Proceedings.

ICRA'04. 2004 IEEE International Conference on.

Gaudenzi, B. (2009). Assessing risks in projects and processes. In R. Ritchie & G. Zsidisin (Eds.), Supply

Chain Risk (pp. 67-82): Springer.

77

Griffis, S. E., & Whipple, J. M. (2012). A Comprehensive Risk Assessment and Evaluation Model.

Transportation Journal, 51(4), 428-451.

Hallikas, J., Karvonen, I., Pulkkinen, U., Virolainen, V.-M., & Tuominen, M. (2004). Risk management

processes in supplier networks. International Journal of Production Economics, 90(1), 47-58.

Hallikas, J., & Varis, J. (2009). Risk management in value networks. In R. Ritchie & G. Zsidisin (Eds.),

Supply Chain Risk (pp. 35-52): Springer.

Haywood, M., & Peck, H. (2003). Improving the management of supply chain vulnerability in UK

aerospace manufacturing. Paper presented at the Proceedings of the 1st EUROMA/POMs

Conference.

Henke, M. (2009). Enterprise and Supply Risk Management. In R. Ritchie & G. Zsidisin (Eds.), Supply

Chain Risk (pp. 177-185): Springer.

Jüttner, U., Peck, H., & Christopher, M. (2003). Supply chain risk management: outlining an agenda

for future research. International Journal of Logistics: Research and Applications, 6(4), 197-

210.

Jüttner, U., & Ziegenbein, A. (2009). Supply chain risk management for small and medium-sized

businesses. In R. Ritchie & G. Zsidisin (Eds.), Supply Chain Risk (pp. 199-217): Springer.

Khan, O., Christopher, M., & Burnes, B. (2009). The role of product design in global supply chain risk

management. In R. Ritchie & G. Zsidisin (Eds.), Supply Chain Risk (pp. 137-153): Springer.

Kleindorfer, P. R., & Saad, G. H. (2005). Managing disruption risks in supply chains. Production and

Operations Management, 14(1), 53-68.

Knemeyer, A. M., Zinn, W., & Eroglu, C. (2009). Proactive planning for catastrophic events in supply

chains. Journal of Operations Management, 27(2), 141-153.

Levi, D. S., Vassiladis, C., & Kyratzoglou, I. (2013). Supply chain and risk management; making the

right risk decisions to strengthen operations performance: Pwc.

Manuj, I., & Mentzer, J. T. (2008). Global supply chain risk management strategies. International

Journal of Physical Distribution & Logistics Management, 38(3), 192-223.

Mau, N., & Mau, M. (2009). Securing Global Food Distribution Networks. In R. Ritchie & G. Zsidisin

(Eds.), Supply Chain Risk (pp. 331-344): Springer.

Melnyk, S. A., Rodrigues, A., & Ragatz, G. L. (2009). Using simulation to investigate supply chain

disruptions. In R. Ritchie & G. Zsidisin (Eds.), Supply Chain Risk (pp. 103-122): Springer.

Mullai, A. (2009). Risk management system–a conceptual model. In R. Ritchie & G. Zsidisin (Eds.),

Supply Chain Risk (pp. 83-101): Springer.

Narasimhan, R., & Talluri, S. (2009). Perspectives on risk management in supply chains. Journal of

Operations Management, 27(2), 114-118.

78

Norrman, A., & Jansson, U. (2004). Ericsson's proactive supply chain risk management approach after

a serious sub-supplier accident. International Journal of Physical Distribution & Logistics

Management, 34(5), 434-456.

Peck, H. (2006). Reconciling supply chain vulnerability, risk and supply chain management.

International Journal of Logistics: Research and Applications, 9(2), 127-142.

Perry, M. (2007). Natural disaster management planning: a study of logistics managers responding to

the tsunami. International Journal of Physical Distribution & Logistics Management, 37(5),

409-433.

Ritchie, B., & Brindley, C. (2009). SCRM and performance–issues and challenges. In R. Ritchie & G.

Zsidisin (Eds.), Supply Chain Risk (pp. 249-270): Springer.

Seiter, M. (2009). Behavioural Risks in Supply Networks. In R. Ritchie & G. Zsidisin (Eds.), Supply Chain

Risk (pp. 235-247): Springer.

Sheffi, Y. (2005). Building a Resilient Supply Chain. Harvard business Review, 1(8), 1-4.

Sheffi, Y. (2008). Resilience: What it is and how to achieve it: The House Committee on Homeland

Security “The Resilient Homeland–Broadening the Homeland Security Strategy.

Sheffi, Y., & Rice Jr, J. B. (2005). A supply chain view of the resilient enterprise. MIT Sloan

Management Review, 47(1).

Sitkin, S. B., & Pablo, A. L. (1992). Reconceptualizing the determinants of risk behavior. Academy of

management review, 17(1), 9-38.

Smith, P. G. (2002). Managing risk proactively in product development projects. Paper presented at

the IPLNET workshop, Switzerland.

Smith, P. G., & Merritt, G. M. (2002). Proactive Risk Management. Executive Book Summaries, 24(11),

1-8.

Sodhi, M. S., Son, B. G., & Tang, C. S. (2012). Researchers' perspectives on supply chain risk

management. Production and Operations Management, 21(1), 1-13.

Tang, C., & Tomlin, B. (2009). How Much Flexibility Does It Take to Mitigate Supply Chain Risks? In R.

Ritchie & G. Zsidisin (Eds.), Supply Chain Risk (pp. 155-174): Springer.

Tang, C. S. (2006). Perspectives in supply chain risk management. International Journal of Production

Economics, 103(2), 451-488.

Tomlin, B. (2009). Disruption‐management strategies for short life‐cycle products. Naval Research

Logistics (NRL), 56(4), 318-347.

Voss, D., & Whipple, J. (2009). Food Supply Chain Security: Issues and Implications. In R. Ritchie & G.

Zsidisin (Eds.), Supply Chain Risk (pp. 293-305): Springer.

Wagner, S. M., & Bode, C. (2006). An empirical investigation into supply chain vulnerability. Journal of

purchasing and supply management, 12(6), 301-312.

79

Wagner, S. M., & Bode, C. (2008). An empirical examination of supply chain performance along

several dimensions of risk. Journal of business logistics, 29(1), 307-325.

Wagner, S. M., & Bode, C. (2009). Dominant risks and risk management practices in supply chains. In

R. Ritchie & G. Zsidisin (Eds.), Supply Chain Risk (pp. 271-290): Springer.

Wieland, A., & Wallenburg, C. M. (2012). Dealing with supply chain risks: Linking risk management

practices and strategies to performance. International Journal of Physical Distribution &

Logistics Management, 42(10), 887-905.

Zhao, L., Huo, B., Sun, L., & Zhao, X. (2013). The impact of supply chain risk on supply chain

integration and company performance: a global investigation. Supply Chain Management: An

International Journal, 18(2), 115-131.

Zsidisin, G. A. (2003). A grounded definition of supply risk. Journal of purchasing and supply

management, 9(5), 217-224.

Zsidisin, G. A., & Ellram, L. M. (2003). An Agency Theory Investigation of Supply Risk M anagement.

Journal of Supply Chain Management, 39(3), 15-27.

80

9 Appendices

Appendix 1: PWC results

Percentage of companies with more than 3 incidents, that suffered an impact of 3% or higher on

their performance as a result of supply chain disruptions. Source: Levi et al. (2013).

81

Appendix 2: Participated Belgian companies

company name function IC

1 VCST industrial products Koen Verhaeren Operations Manager 29

2 Dewulf NV Thomas Decan Production Manager 28

3 GEA process engineering NV Rudy Van de Perre Operations Director 28

4 Henrad Luc Geysen Supply Chain Director 25

5 Alliance International Pascal Demarets Vice President Operations 28

6 Esco Couplings Stef Huybrechts Operations Director 28

7 Anglo Belgian Corporation Johan Van de Velde Production Manager 28

8 SKT Bart Bauters Director 28

9 Asco industries Belgium Guido van den Berghe Plant Manager 30

10 Roxell Filip Cauwels Plant Manager 28

11 MCsyncro Donald De Buck Production Manager 29

12 Recticel NV - BL Flexible Foams Dirk Van De Velde Manufacturing Manager 29

13 International automotive

components group

Koen Hendrickx Purchase Manager & Logistics 29

14 Röchling Automotive Gijzegem NV Patrick Temmerman Plant Manager 29

15 Airkan Steven Coeman Production Manager 25

16 Tenneco Jelle Leenknegt Operations Manager 29

17 Team industries Walter Dumarey CEO 25

18 Alex Profiles BVBA Dave Debosschere Managing Director 25

19 PolyVision NV Theo Vanheusden Director of Manufacturing & Site

Manager

25

20 Benteler automotive Luigi Neirynck Production Manager 29

21 Hansen Industrial Transmission Bruno Everaert Operations Manager 28

22 Johnson Controls Filip Bral Quality Manager 29

23 Joris Ide Jan Wauters Operations Manager 25

24 Delta Light Tom Compernolle Head of procurement (CPO) 27

25 Rogers Corporation Geert Verreecke Manufacturing Team Leader 26

26 Dana - Spicer Off-Highway Wim Thuy Manufacturing Manager 28

27 TE Connectivity Cammaert Denis Operations Manager 26

28 Niko NV Goedele Heylen Director Operations 27

29 Engineering Pieter Verhaert Engineering Manager 25

30 DAF Trucks Vlaanderen NV Marc Beets Managing Director 29

82

Appendix 3: Internal consistency scale measurement

Environment

Risk probability

83

Risk Impact

Risk Management

84

Supply Chain Management Practices

Supply Chain Design and Complexity

85

Appendix 4: Descriptive statistics

Environment

Descriptive Statistics

N Mean Std. Deviation Variance

SubstitutionThreat 828 2,94 1,103 1,216

MarketEntry 838 3,00 1,092 1,192

BargainingPowerS 830 3,11 ,903 ,816

SocPressure 832 3,24 1,062 1,129

EnvirPressure 835 3,33 1,070 1,144

TechnologicalChange 838 3,33 1,003 1,007

MarketSize 840 3,36 ,881 ,776

MarketSpan 833 3,46 1,021 1,042

MarketConcentration 836 3,49 1,077 1,160

BargainingPowerC 832 3,71 ,944 ,891

CompetitiveRivalry 835 3,86 ,918 ,843

Valid N (listwise) 794

Environment constructs

Descriptive Statistics

N Mean Std. Deviation

PEST 828 3,3023 ,76588

MARKET 828 3,4352 ,68962

PORTER 811 3,3258 ,55169

Valid N (listwise) 794

Risk probability

Descriptive Statistics

N Mean Std. Deviation Variance

Prob_Shipment 801 2,32 1,212 1,469

Prob_Operations 804 2,52 1,181 1,396

Prob_Supplier 806 2,74 1,168 1,364

Valid N (listwise) 801

86

Risk Impact

Descriptive Statistics

N Mean Std. Deviation Variance

Imp_Shipment 801 3,37 1,320 1,742

Imp_Operations 804 3,52 1,241 1,540

Imp_Supplier 807 3,66 1,183 1,399

Valid N (listwise) 801

Proactive and Reactive Risk Management (last 3 year)

Descriptive Statistics

N Mean Std. Deviation Variance

RecoveringL3Y 794 3,15 1,077 1,159

DetectingL3Y 796 3,27 ,993 ,986

RespondingL3Y 795 3,28 ,971 ,943

PreventingL3Y 798 3,42 ,958 ,919

Valid N (listwise) 791

Proactive and Reactive Risk Management (now)

Descriptive Statistics

N Mean Std. Deviation Variance

Recovering 794 3,35 1,080 1,166

Detecting 795 3,46 ,957 ,916

Responding 797 3,47 ,966 ,933

Preventing 798 3,52 ,935 ,875

Valid N (listwise) 790

Supply chain Management practices (last 3 year)

Descriptive Statistics

N Mean Std. Deviation Variance

SystemCouplingC 768 2,77 1,238 1,533

SystemCouplingS 777 2,80 1,157 1,338

InterDistrC 762 2,83 1,289 1,663

InterSourcingS 776 2,89 1,226 1,503

CollabApprC 772 3,02 1,124 1,263

SharingInfoC 773 3,05 1,111 1,235

DecisionMakingS 778 3,05 1,022 1,045

DecisionMakingC 772 3,07 1,118 1,249

SharingInfoS 782 3,20 ,991 ,981

CollabApprS 780 3,21 1,030 1,062

Valid N (listwise) 747

87

Supply chain Management practices (now)

Descriptive Statistics

N Mean Std. Deviation Variance

SystemCoupling_C 763 2,93 1,278 1,634

InterSourcing_S 772 2,95 1,201 1,443

SystemCoupling_S 774 2,95 1,190 1,416

InterDistr_C 759 2,96 1,314 1,727

CollabAppr_C 770 3,15 1,146 1,313

DecisionMaking_S 777 3,18 1,040 1,081

DecisionMaking_C 767 3,22 1,127 1,269

SharingInfo_C 772 3,23 1,119 1,253

CollabAppr_S 778 3,33 ,978 ,956

SharingInfo_S 782 3,37 ,974 ,950

Valid N (listwise) 736

Sustainability SCM practices (3 years ago)

Descriptive Statistics

N Minimum Maximum Mean Std. Deviation

SusPerformanceAssesmentS 794 1 5 3,00 1,151

SusTrainingS 795 1 5 2,46 1,247

SusJointEffortS 775 1 5 2,66 1,189

Valid N (listwise) 772

Sustainability SCM practices (now)

Descriptive Statistics

N Minimum Maximum Mean Std. Deviation

SusPerformanceAssesment_S 792 1 5 3,15 1,130

SusTraining_S 787 1 5 2,64 1,281

SusJointEffort_S 768 1 5 2,86 1,235

Valid N (listwise) 765

88

Supply Chain Design and Complexity (last 3 years)

Descriptive Statistics

N Mean Std. Deviation Variance

OneVSMultiplePlants 545 2,82 1,441 2,076

StableVSchangingFlexibilityPlant 547 2,88 1,300 1,689

NetwPerfMgmtSystemL3Y 523 3,06 1,185 1,404

UseOfTechnologyL3Y 524 3,23 1,163 1,352

IntegrInfoSystems 546 3,64 1,291 1,665

Valid N (listwise) 503

Supply Chain Design and Complexity (now)

Descriptive Statistics

N Mean Std. Deviation Variance

OneVSMultiplePlants 545 2,82 1,441 2,076

StableVSchangingFlexibilityPlant 547 2,88 1,300 1,689

NetwPerfMgmtSystem 525 3,22 1,220 1,488

UseOfTechnology 528 3,39 1,112 1,237

IntegrInfoSystems 546 3,64 1,291 1,665

Valid N (listwise) 502

Appendix 5: Different frameworks

Framework 1:

89

Framework 2:

Appendix 6: Confirmatory Factor analysis for alternative framework

formulations

market entry in PORTER and market size in PEST and included in market

Latent Variable Indicators Loadings

Indicator

Reliability

Cronbach's

alpha AVE

MARKET MarketConcentration 0,7323 0,53626329 0,6552 0,4903

MarketEntry 0,7395 0,54686025

MarketSize 0,6516 0,42458256

MarketSpan 0,6733 0,45333289

PEST EnvirPressure 0,6906 0,47692836 0.7033 0,5191

SocPressure 0,6551 0,42915601

TechnologicalChange 0,785 0,616225

Market Size 0,7445 0,55428025

PORTER BargainingPowerCust 0,6169 0,38056561 0,6961 0,4382

BargainingPowerSuppl 0,6045 0,36542025

CompetitiveRivalry 0,6038 0,36457444

Market Entry 0,7821 0,61168041

ThreatSubstitution 0,6847 0,46881409

RiskImpact Imp_Operations 0,9783 0,95707089 0,9593 0,9609

Imp_Shipment 0,9604 0,92236816

Imp_Supplier 0,9567 0,91527489

RiskProbability Prob_Operations 0,9776 0,95570176 0,9489 0,9513

Prob_Shipment 0,964 0,929296

90

Prob_Supplier 0,961 0,923521

ProactiveRiskMgmt Preventing 0,9809 0,96216481 0,9632 0,9316

Detecting 0,9796 0,95961616

ReactiveRiskMgmt Recovering 0,9743 0,94926049 0,9659 0,9362

Responding 0,9764 0,95335696

MARKET PEST PORTER

Proactive

RiskMgmt

Reactive

RiskMgmt

Risk

Impact

Risk

Probability

MARKET 0,7002

PEST 0,7135 0,7205

PORTER 0,7331 0,5641 0,6620

ProactiveRiskMgmt 0,2867 0,2439 0,2072 0,9803

ReactiveRiskMgmt 0,2926 0,2515 0,2033 0,9588 0,9753

RiskImpact 0,2707 0,2044 0,2215 0,7277 0,7195 0,9652

RiskProbability 0,2908 0,2038 0,232 0,6439 0,6376 0,8235 0,9676

All environmental factors together

Latent Variable Indicators Loadings

Indicator

Reliability

Cronbach's

alpha AVE

Environment MarketConcentration 0,671 0,450241 0,8293 0,3648

MarketEntry 0,6829 0,46635241

MarketSize 0,5758 0,33154564

MarketSpan 0,6062 0,36747844

EnvirPressure 0,6607 0,43652449

SocPressure 0,5619 0,31573161

TechnologicalChange 0,6464 0,41783296

BargainingPowerCust 0,5475 0,29975625

BargainingPowerSuppl 0,5101 0,26020201

CompetitiveRivalry 0,5998 0,35976004

ThreatSubstitution 0,5542 0,30713764

RiskImpact Imp_Operations 0,9783 0,95707089 0,9593 0,9609

Imp_Shipment 0,9604 0,92236816

Imp_Supplier 0,9567 0,91527489

RiskProbability Prob_Operations 0,9776 0,95570176 0,9489 0,9513

Prob_Shipment 0,964 0,929296

Prob_Supplier 0,961 0,923521

ProactiveRiskMgmt Preventing 0,9809 0,96216481 0,9632 0,9316

Detecting 0,9796 0,95961616

ReactiveRiskMgmt Recovering 0,9743 0,94926049 0,9659 0,9362

Responding 0,9764 0,95335696

91

Environment

Proactive

RiskMgmt

Reactive

RiskMgmt

Risk

Impact

Risk

Probability

Environment 0,603987

ProactiveRiskMgmt 0,2778 0,980255

ReactiveRiskMgmt 0,2825 0,9588 0,975346

RiskImpact 0,2623 0,7277 0,7195 0,965194

RiskProbability 0,2703 0,6439 0,6376 0,8235 0,967574

General Supply chain management practices

Latent Variable Indicators Loadings

Indicator

Reliability

Cronbach's

alpha AVE

SCMpractices CollabAppr_C 0,9339 0,87217 0,9835 0,8711

CollabAppr_S 0,9513 0,90497

DecisionMaking_C 0,9208 0,84787

DecisionMaking_S 0,9456 0,89416

InfoSharing_C 0,9385 0,88078

InfoSharing_S 0,9435 0,89019

InternDistr_C 0,884 0,78146

InternSourcing_S 0,9324 0,86937

SystemCoupling_C 0,9356 0,87535

SystemCoupling_S 0,9461 0,89511

MARKET PEST

PORTER

Proactive

RiskMgmt

Reactive

RiskMgmt

Risk

Impact

Risk

Probability

SCM

practices

MARKET 0,7002

PEST 0,5927 0,7750

PORTER 0,561 0,5419 0,6866

ProactiveRiskMgmt 0,2867 0,222 0,1656 0,9803

ReactiveRiskMgmt 0,2927 0,2287 0,1638 0,9586 0,9753

RiskImpact 0,2707 0,1829 0,1814 0,7276 0,7194 0,9652

RiskProbability 0,2909 0,1714 0,1829 0,6438 0,6375 0,8235 0,9676

SCMpractices 0,2466 0,2218 0,1508 0,6633 0,6635 0,5856 0,5332 0,9333

92

Sustainable Supply chain management practices

Latent Variable Indicators Loadings

Indicator

Reliability

Cronbach's

alpha AVE

sus. SCM practices SusJointEffort_S 0,9123 0,8322913 0,9247 0,8691

SusPerfAss_S 0,9325 0,8695563

SusTraining_S 0,9514 0,905162

Market PEST

PORTER

Proactive

RiskMgmt

Reactive

RiskMgmt

Risk

Impact

Risk

Probability

SCM sust.

practices

Market 0,70021

PEST 0,5927 0,77505

PORTER 0,561 0,5419 0,68651

ProactiveRiskMgmt 0,2867 0,222 0,1656 0,9802551

ReactiveRiskMgmt 0,2927 0,2287 0,1638 0,9586 0,975346

RiskImpact 0,2707 0,1829 0,1814 0,7276 0,7194 0,9652

RiskProbability 0,2909 0,1714 0,1829 0,6438 0,6375 0,8235 0,96757429

SCM sust. practices 0,293 0,2553 0,175 0,5716 0,5836 0,5319 0,4656 0,9322553

Supply chain design and complexity

Latent Variable Indicators Loadings

Indicator

Reliability

Cronbach's

alpha AVE

Supply chain Design

and complexity

NetwPerfMgmtSystem 0,9683 0,9376049 0,9804 0,926

OneVSMultiplePlants 0,9523 0,9068753

IntegrInfoSystems 0,9598 0,921216

UseOfTechnology 0,9729 0,9465344

StableVSchangingFlexibilityPlant 0,9582 0,9181472

Market PEST

PORTER

Proactive

RiskMgmt

Reactive

RiskMgmt

Risk

Impact

Risk

Probability SCD&C

SCM (sus.)

practices

Market 0,7002 0 0 0 0 0 0 0 0

PEST 0,5927 0,77505 0 0 0 0 0 0 0

PORTER 0,561 0,5419 0,68651 0 0 0 0 0 0

Proactive 0,2867 0,222 0,1657 0,98025507 0 0 0 0 0

Reactive 0,2926 0,2286 0,1639 0,9588 0,9753461 0 0 0 0

Risk Impact 0,2707 0,1829 0,1814 0,7277 0,7195 0,9652 0 0 0

Risk Prob. 0,2909 0,1714 0,1829 0,6438 0,6376 0,8235 0,96757429 0 0

SCD&C 0,0914 0,1373 0,0461 0,1862 0,2135 0,225 0,207 0,962289 0

Sus. SCM 0,2842 0,2309 0,1626 0,483 0,4881 0,4936 0,5876 0,1696 0,9350936

Gen. SCM 0,2465 0,2218 0,1508 0,6632 0,6634 0,5855 0,5332 0,2669 0,933381

93

Appendix 6: T-statistics for mediators

General SCM Sustainable SCM

First framework

Sample

Mean

(M)

Standard

Error

(STERR)

T

Statistics

Sample

Mean

(M)

Standard

Error

(STERR)

T

Statistics

Market -> RiskImpact 0,1243 0,0475 2,6506 0,1328 0,0513 2,5876

Market -> RiskProbability 0,1616 0,0485 3,3971 0,1521 0,0521 2,9194

Market -> SCMpractices 0,1448 0,0599 2,4769 0,238 0,0604 3,9435

PEST -> RiskImpact -0,0198 0,0376 0,5132 -0,0269 0,0381 0,7074

PEST -> RiskProbability -0,0242 0,0376 0,6612 -0,0731 0,0351 2,0825

PEST -> SCMpractices 0,161 0,0458 3,5349 0,105 0,0469 2,2379

PORTER -> RiskImpact 0,0357 0,0391 0,9027 0,0429 0,0516 0,8307

PORTER -> RiskProbability 0,0311 0,0373 0,7135 0,0422 0,0517 0,8154

PORTER -> SCMpractices -0,0049 0,0521 0,3483 -0,0263 0,0443 0,5935

RiskImpact -> ProactiveRiskMgmt 0,5982 0,0846 7,2521 0,6136 0,0825 7,4369

RiskImpact -> ReactiveRiskMgmt 0,5892 0,0848 7,1289 0,6042 0,0823 7,3406

RiskProbability -> ProactiveRiskMgmt 0,1499 0,0721 1,9216 0,1385 0,0725 1,9111

RiskProbability -> ReactiveRiskMgmt 0,1508 0,0736 1,9038 0,14 0,0725 1,9329

SCMpractices -> RiskImpact 0,5501 0,0539 10,306 0,4546 0,0629 7,2219

SCMpractices -> RiskProbability 0,4927 0,0539 9,2288 0,5538 0,0583 9,4955

General SCM Sustainable SCM

Second framework

Sample

Mean

(M)

Standard

Error

(STERR)

T

Statistics

Sample

Mean

(M)

Standard

Error

(STERR)

T

Statistics

Market -> RiskImpact 0,2357 0,0669 3,541 0,236 0,0645 3,6747

Market -> RiskProbability 0,2768 0,0697 4,0137 0,276 0,0685 4,0861

PEST -> RiskImpact 0,0211 0,0443 0,5186 0,0214 0,0458 0,502

PEST -> RiskProbability -0,0118 0,0438 0,2752 -0,0123 0,0446 0,2702

PORTER -> RiskImpact 0,0429 0,0487 0,7415 0,043 0,0506 0,7131

PORTER -> RiskProbability 0,0409 0,0478 0,6798 0,0406 0,0517 0,6292

RiskImpact -> ProactiveRiskMgmt 0,4468 0,0756 5,9763 0,5893 0,0894 6,809

RiskImpact -> ReactiveRiskMgmt 0,4328 0,0767 5,7265 0,5798 0,0909 6,593

RiskImpact -> SCMpractices 0,4375 0,084 5,4219 0,0345 0,0609 0,4941

RiskProbability -> ProactiveRiskMgmt 0,088 0,0568 1,4498 0,0659 0,0841 0,6369

RiskProbability -> ReactiveRiskMgmt 0,0891 0,0581 1,4234 0,0592 0,0862 0,5507

RiskProbability -> SCM practices 0,1704 0,0734 2,1555 0,5558 0,0668 8,432

SCM practices -> ProactiveRiskMgmt 0,3509 0,0599 5,9235 0,1541 0,0449 3,3612

SCM practices -> ReactiveRiskMgmt 0,3589 0,0587 6,1708 0,1683 0,0446 3,6884

94

Appendix 7: Sobel test

Mediator between environment and risk perception

Mediation Test

generality direct no

med

direct w

med

IV->

Med

beta

Med ->

DV beta

IV ->med

SE

Med ->

DV SE Sobel test

Market ->

RiskImpact 0,237 0,133 0,1848 0,5553 0,0599 0,0559 2,946320656

Market ->

RiskProbability 0,28 0,187 0,1848 0,4971 0,0599 0,057 2,908512633

PEST ->

RiskImpact 0,023 -0,074 0,1228 0,5553 0,0515 0,0559 2,318605859

PEST ->

RiskProbability -0,012 -0,045 0,1228 0,4971 0,0515 0,057 2,300044582

PORTER ->

RiskImpact 0,036 0,048 -0,0189 0,5553 0,0527 0,0559 -0,35840029

PORTER ->

RiskProbability 0,033 0,044 -0,0189 0,4971 0,0527 0,057 -0,35833092

Mediation Test

sustainability

direct no

med

direct w

med

IV->

Med

beta

Med ->

DV beta

IV ->

med SE

Med ->

DV SE Sobel test

Market ->

RiskImpact 0,237 0,133 0,238 0,4546 0,0588 0,0614 3,55154551

Market ->

RiskProbability 0,28 0,152 0,238 0,5538 0,0588 0,0574 3,732464065

PEST ->

RiskImpact 0,023 -0,027 0,105 0,4546 0,0463 0,0614 2,168380126

PEST ->

RiskProbability -0,012 -0,073 0,105 0,5538 0,0463 0,0574 2,207651769

PORTER ->

RiskImpact 0,036 0,043 -0,0263 0,4546 0,0434 0,0614 -0,60397116

PORTER ->

RiskProbability 0,033 0,042 -0,0263 0,5538 0,0434 0,0574 -0,60479898

95

Mediator between risk perception and risk managements

General SCM

Mediation Test

direct no

med

direct w

med

IV->

Med

beta

Med ->

DV beta

IV ->

med SE

Med ->

DV SE Sobel test

RiskImpact ->

ProactiveRiskMgmt 0,138 0,452 0,4552 0,3547 0,084 0,0625 3,919273337

RiskImpact ->

ReactiveRiskMgmt 0,14 0,439 0,4552 0,3623 0,084 0,0617 3,982348619

RiskProbability ->

ProactiveRiskMgmt 0,614 0,082 0,1583 0,3547 0,0731 0,0625 2,023237295

RiskProbability ->

ReactiveRiskMgmt 0,604 0,083 0,1583 0,3623 0,0731 0,0617 2,031763086

Sustainable SCM

Mediation Test

direct no

med

direct w

med

IV->

Med

beta

Med ->

DV beta

IV -

>med SE

Med ->

DV SE Sobel test

RiskProbability ->

ProactiveRiskMgmt 0,138 0,054 0,5629 0,151 0,0611 0,0476 2,999433246

RiskProbability ->

ReactiveRiskMgmt 0,14 0,047 0,5629 0,1645 0,0611 0,046 3,333742626

RiskImpact ->

ProactiveRiskMgmt 0,614 0,609 0,0301 0,151 0,0572 0,0476 0,519129801

RiskImpact ->

ReactiveRiskMgmt 0,604 0,599 0,0301 0,1645 0,0572 0,046 0,520617411

96

Appendix 8: Paired Sampled T-statistics

Europe Versus Asia

Environment

Risk Probability

Risk Impact

97

Risk Management

General SCM practices

Sustainable SCM practices

Supply chain Complexity and Design

98

Low Versus High complex networks

Environment

Risk probability

Risk impact

Risk management

99

General SCM practices

Sustainable SCM practices

100

Appendix 9: Multi-group moderation and moderated mediation

First framework: SCM practices as mediator variables between environment and risk

perception

t-statistics first framework General SCM practices Sustainable SCM practices

MULTIGROUP MODERATION Asia VS EU L VS H compl Asia VS EU L VS H compl

Market -> RiskImpact 0,6359 0,7554 0,1017 0,6449

Market -> RiskProbability 1,1892 0,8877 0,5667 0,8953

Market -> SCMpractices 1,1295 0,2488 1,1138 1,0071

PEST -> RiskImpact 0,8564 0,3586 1,0135 0,0682

PEST -> RiskProbability 0,8752 1,3912 1,0766 1,6242

PEST -> SCMpractices 0,0793 0,9016 0,0823 0,3683

PORTER -> RiskImpact 0,9234 0,6434 0,5830 0,2117

PORTER -> RiskProbability 0,7361 0,7447 0,5702 0,3206

PORTER -> SCMpractices 0,6403 0,2952 1,2589 0,0545

RiskImpact -> ProactiveRiskMgmt 0,6523 0,2320 0,6822 0,1851

RiskImpact -> ReactiveRiskMgmt 0,8333 0,1418 0,8873 0,1318

RiskProbability -> ProactiveRiskMgmt 1,4035 1,5103 1,4342 1,4014

RiskProbability -> ReactiveRiskMgmt 1,4983 1,5621 1,5379 1,4461

SCMpractices -> RiskImpact 1,5009 0,2412 0,1811 1,7324

SCMpractices -> RiskProbability 0,9471 1,2217 0,3756 0,5853

MODERATED MEDIATION

Market -> ProactiveRiskMgmt 0,0921 0,5414 0,1588 0,6779

Market -> ReactiveRiskMgmt 0,1324 0,5600 0,1973 0,6879

Market -> RiskImpact 0,4830 0,7625 0,5295 0,7815

Market -> RiskProbability 0,1686 1,2184 0,1003 0,9775

PEST -> ProactiveRiskMgmt 0,8700 0,6280 0,9759 0,6196

PEST -> ReactiveRiskMgmt 0,8901 0,5499 0,9987 0,5612

PEST -> RiskImpact 0,8096 0,2623 0,8997 0,3300

PEST -> RiskProbability 0,8173 1,3142 0,9025 1,5949

PORTER -> ProactiveRiskMgmt 1,0701 0,4724 1,2789 0,2779

PORTER -> ReactiveRiskMgmt 1,0701 0,4956 1,2794 0,2736

PORTER -> RiskImpact 1,0368 0,7161 1,2493 0,2701

PORTER -> RiskProbability 0,8804 0,8246 1,0696 0,3544

SCMpractices -> ProactiveRiskMgmt 0,6333 0,2016 0,1201 0,9118

SCMpractices -> ReactiveRiskMgmt 0,7378 0,2174 0,0295 0,9469

101

Second framework: SCM practices as mediator variables between risk perception and risk

management

t-statistics second framework General SCM practices Sustainable SCM practices

MULTIGROUP MODERATION Asia VS EU L VS H compl Asia VS EU L VS H compl

Market -> RiskImpact 0,4976 1,1442 0,5062 1,1739

Market -> RiskProbability 0,1458 1,3351 0,1494 1,2834

PEST -> RiskImpact 0,7539 0,1577 0,7588 0,1431

PEST -> RiskProbability 0,7227 1,2396 0,7377 1,2143

PORTER -> RiskImpact 0,9955 0,6033 1,0715 0,5718

PORTER -> RiskProbability 0,8138 0,7038 0,8736 0,6983

RiskImpact -> ProactiveRiskMgmt 0,0613 0,1446 0,0035 0,1807

RiskImpact -> ReactiveRiskMgmt 0,1062 0,0357 0,1017 0,1461

RiskImpact -> SCMpractices 1,2544 0,6952 0,9063 2,0087

RiskProbability -> ProactiveRiskMgmt 1,7020 1,8121 1,3502 1,8093

RiskProbability -> ReactiveRiskMgmt 1,8689 1,7024 1,4679 1,6676

RiskProbability -> SCMpractices 0,3864 1,7177 0,9838 1,3541

SCMpractices -> ProactiveRiskMgmt 0,2912 0,0693 1,2534 1,9513

SCMpractices -> ReactiveRiskMgmt 0,6251 0,6917 1,5046 1,7178

MODERATED MEDIATION

Market -> ProactiveRiskMgmt 0,1111 0,8848 0,1324 0,8779

Market -> ReactiveRiskMgmt 0,1500 0,9020 0,1742 0,8940

Market -> SCMpractices 0,7655 1,1293 0,4025 0,0584

PEST -> ProactiveRiskMgmt 0,8080 0,5949 0,8049 0,6170

PEST -> ReactiveRiskMgmt 0,8298 0,5160 0,8266 0,5377

PEST -> SCMpractices 0,8885 0,5226 0,8417 0,4072

PORTER -> ProactiveRiskMgmt 1,0257 0,4569 1,0915 0,4078

PORTER -> ReactiveRiskMgmt 1,0282 0,4765 1,0931 0,4329

PORTER -> SCMpractices 0,9701 0,5471 1,1142 0,5982

RiskImpact -> ProactiveRiskMgmt 0,6679 0,3094 0,6310 0,1923

RiskImpact -> ReactiveRiskMgmt 0,8715 0,2051 0,8234 0,1000

RiskProbability -> ProactiveRiskMgmt 1,4946 1,5499 1,3899 1,6031

RiskProbability -> ReactiveRiskMgmt 1,6070 1,5853 1,4914 1,5595

102

Appendix 10: Statistics for differences with 3 years ago

Variable paired samples t-test

Proactive and Reactive management

Whole world

Asia

Europe

Proactive versus Reactive

103

General SCM practices

Whole world

Asia

104

Europe

Sustainable SCM practices

Whole world

Asia

105

Europe

Paired sample t-tests for relationships

Relationship paired sample t-test Asia versus Europe

Differences now and 3 years ago for the relationship between SCM and RM

T-statistic first

framework

T-statistic second

framework

General Asia SCMpractices -> ProactiveRiskMgmt 0,329748177 0,848347035

SCMpractices -> ReactiveRiskMgmt 0,349440394 1,17079123

Europe SCMpractices -> ProactiveRiskMgmt 0,046033491 0,092671711

SCMpractices -> ReactiveRiskMgmt 0,024877732 0,081973729

Sustainable Asia SCM sus. practices -> ProactiveRiskMgmt 0,439419177 0,245626532

SCM sus. practices -> ReactiveRiskMgmt 0,430489809 0,479315314

Europe SCM sus. practices -> ProactiveRiskMgmt 0,132049205 0,162158132

SCM sus. practices -> ReactiveRiskMgmt 0,204659152 0,144855217

Relationship paired sample t-test Low versus High complex networks

Differences now and 3 years ago for the relationship between SCM and RM

first framework second framework

General High SCMpractices -> ProactiveRiskMgmt 0,206600542 1,077970981

SCMpractices -> ReactiveRiskMgmt 0,301711699 0,954383032

Low SCMpractices -> ProactiveRiskMgmt 0,847346522 0,191774818

SCMpractices -> ReactiveRiskMgmt 0,841522227 0,054850686

Sustainable High SCM sus. practices -> ProactiveRiskMgmt 0,609047769 0,75769831

SCM sus. practices -> ReactiveRiskMgmt 0,566825692 0,980248788

Low SCM sus. practices -> ProactiveRiskMgmt 1,269361435 0,68087869

SCM sus. practices -> ReactiveRiskMgmt 1,315267878 0,782414819